ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EA32C9B366A
|
Infrastructure Scan
ADDRESS: 0xed8bbd662b62461c020172dc99e92e03398be1d5
DEPLOYED: 2026-05-02 16:21:47
LAST_TX: 2026-05-02 16:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 90EEC0D7. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 7 public, 2 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xf660. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x131608d14934c9b5c264d120436fa225db8845d3 0x4830696ea721808c1eb066107b2bbb26997e9686 0x245f8ec0fbaada530cd8aa6ed5e46b07f4ad3fac 0x31088892a7f637115fa6e5a4c5c005f55fbe72e3 0x2612583b543dcdef2f3fc8573beee43460c8e1b8 0x36ffa107ce341c87b22a62e676259b16aabd894c 0x4c5094ae11222a3f5355a9422528953d526e0f53 0xab5f13d2bf6fba7a34b36c6ab61ab6808ddb46b2 0x0b58383d8c4912654e9703a0854f069cc75b0d46 0xf0f1f9d9fa1c3274e7c054439c334328fe2226b4 0xf6c29a790c82a147e6ae12268ec0124b2382b43c 0xc944a1c548317b1e39be03be11fd44b391010796 0xd26b9821e9e1651e37798c0d69231c347e85b457 0xe075c422c1d95d7baa45675d761715a8776e5aba 0xd66e5d3ecea3de5c86327654bd251b24687e8ed2 0x3c652e47e2f3ce336cedf295c8f044b0e8101451 0xdb758dd0c9901fb22cf1975f1a718e30d0eb5bc7 0xdeaaad29a92d0b6f14d46fb4b0ee0914f3865803 0x3e1f8d95683219d1ea29029c2936fa6859a7924a 0x31b23167bbab99eb37a65c68246b955ede65bdd7