ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-56266506DE02
Infrastructure Scan ADDRESS: 0x81580fdc3f4b5323f4860d789c7ba290991afaaf DEPLOYED: 2026-05-13 09:19:59 LAST_TX: 2026-05-13 17:36:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 2.87 bit/byte. [SCAN] Detecting compiler version: v0.8.20. [MEM] Initializing storage slot tracker… [VULN] Testing for 'Reentrancy’ via external call trace. [SIM] Executing dry-run for 'transferFrom’ method… [TRACE] Logic branch 'if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3e087ce4a35e4a183ed52f4d941269364aa4328 0x2fcbe9bd99f297926246f9d05ff8488cff6d1978 0xf5c6366ba99e07f78f3d2df0b6bb029609216ce8 0x8921b3e0f6410af033164635c89a17d175dc4dc5 0xe6c35f7917503e202675fb969502d5ab807c2b79 0xefb0756aebb14653407a8a3f7fd69d3d44533c13 0xb7657e703bd7898e72fd0413aaef3f28f00c0564 0x3a9c1f8703fbea3e0895df5200ded305444d4b71 0xb4208af406592a19a74dc0b388c17da047696b94 0xea93b4149abd65ea35ba4da9c5e1ab0e2f18dcf0 0x8b6f5533f5ca26260b36570c2d5f0ee6c004e773 0xac69119c6e8e32003f3ec86702fabc66977a43de 0x7d19cfa08dc860fdafc3bbf4e9d35bc6e2e60f09 0x718aa961da8acf8ef5cb06bdabdd68430095bd87 0xf76f85e3b854234f3517603a7c9ca27765612471 0x0456a9b65b1b215a348c5e0a4818e2af94223c0e 0xfd7a8976b9e199c3e1ecb6c45ac0b5e6ae410d97 0xfee24cf58d2f74fa9b01d715e342d8462ac832a1 0xfaa3ed1589f17909cb8fe4861bca336ea2801508 0xc5592fb52e1cc87c8125aa413a5e6c32c42f75e2