ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7A4C336D9658
|
Infrastructure Scan
ADDRESS: 0xd425c2446cae326b01abdd38cfeef9ee17ed75a8
DEPLOYED: 2026-04-24 15:22:23
LAST_TX: 2026-04-24 15:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xd425c2446cae326b01abdd38cfeef9ee17ed75a8… [FETCH] Metadata hash (IPFS): 33d9fbee…c715ffa1… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: e2e89014c7838b35. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x56510ad7ad4b76c7395d121d4665f5c740174f29 0xb81df28743bedf32a8a38faa79dcc91b717eb2a8 0xcce78cfd13ae4e7055e8f01af1053eb4e738f2ad 0x33a4e5882806979c7b8fd895e6698903b48eeab3 0x22cab9a1c43e8623f217dba2b7c734f676792244 0x51d7d7a5d2366287bd990ab8fdc86a9ed046657f 0x0df79d2af37a28758fd3f76b07b3e6a49175b408 0x2cc534288917600adc9faa6ee4a82d63e92bed67 0x9ae16408827f01182c9f3c7487db0d728d7728cd 0x1f05565d23442f2a82ffec953d52ee7d679677a7 0x35a62aa465b44bf730fcdea901a313f811892817 0xd366c3bb2fbc89957b7bd82b20151833b07ee9fb 0x5d8c638f2dd7afe95585d4100d036aa0cab8e6b6 0x4df5331676488bc9d461b02852ab412398037e08 0x30e3487607bf9c03763030eebdb4c45e07f331f6 0xe51cf44fff703f272a2cbc5d0984ff551ef9548a 0x02ca7e53dde7429a9e74a55497a941a50306b928 0xbc99e7531b093ba5ea2373954695a360da3d4393 0x7676021a8fc9e6a1e98dfe7278bd45f542e6e3a2 0x671caeb3d2983ce9110946d89995e6c1bd9ef2b8