ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-972DB11FA963
|
Infrastructure Scan
ADDRESS: 0xb67579fa3b3f360ad52a1aa4cf0786f52c26b2cf
DEPLOYED: 2026-04-26 23:30:59
LAST_TX: 2026-04-27 00:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 21% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(’36bc9a9a…fb70e4f5′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2e1f12422e35e0faebfbf5285f39cebe06ae3838 0xab250f1271a6833974dfd367588bf68527f68918 0x9462fdfb0ef8585d633670f4abf71a7c26772365 0xd2f175405d3c1a17a0cb009e83f574b09c8d4c6e 0x86b90192d11bf3eb943f38d4392983688e3b22f2 0xe5059385cec334bd96d0bd91508ffb6f48d4b0af 0x010ceb16b84438a67598dc64378d12a2bbe7e884 0x788d838ff21dbaff6f8cdbd31027435d9ff58693 0xc2bb6502a7d8ee3cdb2f96508d6cdf426aa2858f 0xd2f983d57c79070f9448c72e1734d5dc24ad370c 0x822c2f6f71d8855d65406e53f28496420f6b1f66 0x63c154bac7a90766a70853d89ebfab59af57c61a 0x488c52ee858a982ba36788b0d718e45b49c7027c 0x116ce37ebf82f182babdd6e8c5b33c4a0d16a232 0x8e54a03d4c0b20223f8980800a83e58152c7099f 0x3ea7ba7ce99668f5d723a999ba931c844990ab06 0x9b486f43910ab7ebd4c646cad1b85a5524a8ff90 0x49be8aa6c684b15e0c5450e8fa0b16bec1435596 0x32bb729fa386392f18636a5564113fb3a605f1a3 0x38dbe9cdbe235600c9c2d59017f7dc054ab32e5c
