ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6070A1B81B7D
|
Infrastructure Scan
ADDRESS: 0x17e098b541d9da42860d1e34cdc360fbb81ac521
DEPLOYED: 2026-04-27 15:58:23
LAST_TX: 2026-04-28 02:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0xacf434dd successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 5 public, 9 private methods. [MEM] Tracking pointer 0xc52a73a3 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-B1055DED.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(’39B6898D’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4cd58edc1449cf54d70701141e251e7ac258d1f5 0x0af13047eb1d1ff0800537ed3f2c12cc81dde69c 0xc0782dd38bc20dd5e78c266ecbe23d1985a90010 0x118959835cf8e5b32459c1b33fdf1cf5f899772f 0x2476b8be2ff1014792a382194ed68ddd6681e9a1 0x5ea1e02da17340ceb3bfd7bb86e313ecdbb50831 0xe404c27a9df83d359136718ad279c0310ad1d16a 0x387d7b75e0f6cba9bfe358c83e775bff19c94fae 0x24151935af6ebc6359bbe30873f3aa21285a08ff 0x9aa61931288ee00ff05d0cc8c906f5719ffbecac 0x845f507de153d0ade85d0e96a56d0c330d8f8dd3 0x3f8411e3853b65691ed3633209eaa9c0420097f5 0x400c12d9700be5d686ad32f8d6206c97de1e967c 0xbd6e1de787737cb4bb4a175dcca5f36b51315be0 0x9dc2cf350dc6eb7f733ab085f871eb62ca5cc06a 0xbbbbade1845e5b3a5ffbcfd0ed65d8f4cc803c2a 0x3d30ceff12d07403d2c69b675bdad591e3f2a6b8 0x47c25e2c8efb705028decddccd77e17cc501780d 0x1fd268e7b82c6fd4054583883eb9356925a9b481 0x2cf49afca1886e54d37674703d4c4574cf79babd