ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7D3220F6053E
|
Infrastructure Scan
ADDRESS: 0x0d4a7679656f619f363344407fcea2d92ccab88b
DEPLOYED: 2026-04-29 03:30:11
LAST_TX: 2026-04-29 13:52:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xb120. [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Program Counter (PC) synchronized at 7005. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x024d4d748db5f414a9d6dabf9d74d3b5e4062c59 0xcb21f5c6149c8ea465fc75d1519cfe0111f031a6 0x2ad3946b114ed0c4832865d4c1648cd0b16b938d 0x95299411af019deab056a81c9791ab58116f691d 0xb8e4f5fb04789f2c0fa49e90798e847ace87f063 0x95e65c103d6bc42a77d3042b055308fb641a7bf1 0x414ca5fa7b827678041cba6b9e82b770ed0aa2b0 0x85096a88bca1ebd94158afe3f256011a7d08543d 0xbab3e96a21101bd5818958967b3d0a1d38714bbc 0x93554d4b974d11eb69ab22abcb940771899a3bce 0xe051a12d5d1b4066c2c7b944e3164ba174f3e7c3 0xf4532b489cac38f6e1c8ef9ce7381f9ba6c9c550 0xac3a04ebd893a1564b53aa52838cf986b2039765 0xbf634dca5c5644438fe930c2282787acdccbface 0xc5f0134664701c38105289e274218378d5fb7fed 0x33e90c817e7517d89ef580dba7075271bbb264cf 0x01535d3f4b397cf1e56b3b476b37864fde9feffe 0x8777e8463b8385e5fc324e311d8e4b8c3074a63e 0x0dafa5ddf85ef3f89b733c17701f29203efc9d84 0xcabb37a4e82d22c75d2e661cabf2b1ddae50a54b
