May 9, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B5C189171395
|
Infrastructure Scan
ADDRESS: 0x7ed5d66d0314b652d08ddf88d830da85ac153447
DEPLOYED: 2026-05-08 22:42:23
LAST_TX: 2026-05-09 00:39:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Synchronizing with block height 73383. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-D4AB4642.log. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe0469b318d3610bde0983b77eca9d2fc33f8b34e 0x1364f6bafd7c6cf720175337d4866d2b5dfcff4f 0x4c22d1536fcc44a97d641f1662c99c41a358f9bd 0x8802943a2348ba2336d740474aca9c04e2c8ba82 0xe4ae517f50d26286a515f4342b7fcdbc23899935 0x39c73d0e4e1adbd704d5465245164b8a8d751db6 0x1b1177276cd9b630ec53c912eb6a8cf5a29ae6eb 0xfbf8bba149d421ede23f4f2e8579a18f46bedeee 0x16cacbc81249c0a7d2d0271e77f0d05489ab35dc 0xd4c762ae3e9e09da5e1f164254bca245ce32c31f 0x419814b18d1e58741962776631c80fffe8574bed 0x0faa7334319420ca12220848c260e8ad79d5e506 0x932a7bc003cbc1b3c814c90bccd7a4925eb9970b 0x417495202fcdcdca0ded1bf2b6b5a2029d1ccf3b 0x920f37228d6f91464398f04bf24c750190974287 0xa4d7db525effaafee4eee5bd9fd1bfe260fdc3a1 0x32ed22d853fad60dba7ff55e0f7de41845f971ba 0x23b7375d148b2eb7b40b555d3d0ca76e6d8cce99 0x514e22d387a9ea6940f36e35cc56efa6b7246777 0x5983eb0b333169de3d511fd6c6dbbc3f331a2c27




