ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F291CA06855D
|
Infrastructure Scan
ADDRESS: 0xe4015dabc74725544b398f9637e020c586f9081b
DEPLOYED: 2026-04-23 06:24:11
LAST_TX: 2026-04-24 01:54:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 5C29A437. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 1626 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x1eaf. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 5c5cab7de9972c1d. [VALID] Finalizing audit report for 0xe4015dabc74725544b398f9637e020c586f9081b. $line = str_replace(‘5C29A437’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x039f5ed5ed596f722a60595e704603c2e1df35f6 0x045aab3eefcae51fd001cd17c0a910f05fa37014 0xf174ee149e56bcc11315f4e402b6a2c60090b79c 0xf767568e2b95db044ba994bca11ae7464d72b92b 0xc96d68f3498182bc187236572041c72623d87223 0xe0cd9d9dbbf2c3f6934348992045d7e051e5fd1e 0xa389774c1ac4d3452340b3d9fec310dfc3b2c28a 0xe57e8373d660011b8ccb785fc713c04c43da6549 0x670f6c2a8fdc14021e3e2a8297522d8c685da546 0x6bea950f647afa0bdf35b3db0d1d125f56e6545b 0xbf1941b1e4615736ed1b1bfcf6ef00eb1174aaaa 0x41d4b2551bd94b9f2fe564cd4801850e61881740 0xb857964f7ff662727a27a9e0c193bfc8f35d4ba2 0xd008b481ff8c0cd3c582e3901a3598f4d3832628 0x7407ce28f054fed76eacbe43b9f993639ce62816 0x4bbb605fcc745bfcffc76627f2492fa0aa3c7b37 0xb1375b5dca0eed11e534466af7f8ae26f600ed70 0xcda6901820d01f6b2ac7ab95ee7b711478c271f9 0xa7dd870e38c2d9b1ba8cf97a2b794ae4d044b6e0 0x8e5004f51ea25fc595367ae8e04729702fe19a48
