ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4BD9202517E3
|
Infrastructure Scan
ADDRESS: 0x9c692eb4f022b4a3ba3798a2e29d6aa80f4814a4
DEPLOYED: 2026-05-08 13:21:11
LAST_TX: 2026-05-08 16:02:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 8831916B. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 7dd04e60…8df24e16… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 6 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 95% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘8831916B’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x070f60aff89f82fa935a7d932ec0d9b420c5c3b7 0x1ab013ebef60e82dfc55ec90b0974a86d283b935 0x8840afba4057135218c42a26303cf503de213f88 0x6ba4fddf5e04ca86a8d8c9529002269d50752b4f 0x03c2142a77041c5c27bd0635bd4553a7ec7b8771 0x517c9713780a132fc4e54739d675634127ed27af 0x36ad94913faec1aa6ecbe76f7cea966830febdab 0x473a50e354989b3af0ea6915a6c89029a32de2f1 0xa582c37d5849691f475950dc83b4ae1eed0fd8e2 0x8c5af13ce4fa655a881e11e10951162acf834ecb 0x034304c387dd5bd1d129ccfc26680a8d2594db2a 0xac0034b079f6c4bc9f133974240fd32aac8e3121 0xee1b246bdf9b791847bfa1c5ed6b6013280cdd92 0x9c24b33e80105cdabf4072587fb6484d4c085070 0x5fdc39756a64a84518ef00cb6a0ed46971e00a60 0x4b2c01a529b87dc54a46eea3316965c4eea7638d 0xde2e016344929e64ea1317e2f03beeb1fbdb3498 0xda69e583bdce680b5376c9c795faef91bd636b9b 0xa3e4aa06b0c1682a18f58b604a74bc9fbb594d7f 0x4f5139adced4f2a43bad490341b8e3ca8aef23e4