ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C2B40D6E2D88
|
Infrastructure Scan
ADDRESS: 0x64beb438814cf459a3e6a6791444dc6780c128af
DEPLOYED: 2026-05-13 16:49:35
LAST_TX: 2026-05-14 06:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xf7d94a01). [MEM] Garbage collector: 0.13ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-9086E463.log. [VALID] Finalizing audit report for 0x64beb438814cf459a3e6a6791444dc6780c128af. $line = str_replace(‘B6DEE09C’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3613fa4d924e019275382d7b5ed0de6d7ce4d980 0x03ada00257aac1c3a04a867b356f68ab459c0cc4 0xa9db81967b79ea4924c1e899e0393738798bf694 0xc12e24f82b1e4fe09f914486835f0024ee8630e0 0x0ac76816b9867a53a8c1e8e231c2ba79b9a904d6 0xc342a36034086b8e4f331b81f95cfc33d2551e62 0x22c1cf79e2efd6b766b363ebb513680fe60ed2dc 0xb49c4e8e0ca66c8a4715d6121ca805fc26023503 0xdb6f870904fb48973c7e2b3dac8d77585aa703a3 0x4611f1aad49064b01f5e3a6f10ace3b1eb41dd50 0xd8d1085b5de381aa57641eabd2781a29eb64937c 0x43bf585bab2e6fa5cf22e66cef29cc11d76c2a58 0x6750a1f220710f24701f130881e6c7015189eae8 0x6d77c123538b7fd621ee508f6692a49186ebe2f5 0xca12ededb788d7c9be72cdd1c497d4389b8289db 0xe579a7663e6c70c73b9dfdc129ccdcc6d1ea5232 0x97b7858bcdb1857efa1c129dc25946c1f7ef8a90 0x8ad1f22e562b361ce0c64623e5c8162b15e14365 0xaf3fb93450c7ca52333bb203d64a79d342cdb54b 0x26342d219acb0e0ba41729f7b3afcaee448624f2

