ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A0C946B40720
|
Infrastructure Scan
ADDRESS: 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7
DEPLOYED: 2026-05-01 22:16:47
LAST_TX: 2026-05-02 00:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 73. [FETCH] Received 68 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x6b analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘86563eb549e4ed1496615f8d9d1a01b3fa33b355434115fb1c56cdd499cd9dab’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x731424ab603e84da00c1fa265d4200e430dc326d 0x3a3dee69f0cee679db8450f5c7dfbbb6fe5c3641 0x1eb447ac99eecccc9e249f374fa53a740dc2dc8f 0x62754c9f45e8459e366029d093fe7073562d9532 0xda435b094243f3e3e1cdf83a40ee4047da1a371c 0xe2118b44abf4e92e46885a908cd027d3e90cf5b5 0x5af8102fa098d357323ccd36e001519e77af9aec 0xaaefdbd94d5994791a881ce68cd91d56d5880d98 0x5058a6b8a07ba7622a247547731e4fc6e3e94e76 0x6c7743205895f0ac7187f8d07e47eaa60bc625af 0x9ddb49641055b20c9ff20d00decae32ff9b62266 0x3155373d81af3968221674ff2610e813d920cedb 0xd0306b5eadc1c82359151b681eea4484147d2d95 0x933650fd8a22641e351f785f85a37e6e05f446d1 0xeaee70906c32762985b393730b6c7167e52fb58c 0xa3228d6bf80e874178f9696924ef242e62f2fdaa 0xaacbb08a6fba78109160ab36ad138c7aa8453ec7 0xc34b085a6686100077c90d2a2cea6b3ad2a7254c 0xe44eb5d191015064983928474200f95c054831df 0xcbb439064f37a1119eddc6d6bae6ed999320c0c8
