ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-79C25C298509
|
Infrastructure Scan
ADDRESS: 0xfb318f3ac87e61543fc2856250bb9071bbffc32c
DEPLOYED: 2026-05-14 09:24:23
LAST_TX: 2026-05-14 09:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 69. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.67. [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 875d -> 4f00 -> 3b30. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f19ab629b02380bf7529591a8db0df4d2f70df6 0x96a834d6715c3fa23356d237edb3451c121948e3 0xaba102b5579ea9e64b93825adcb056686dfe96d0 0xde76b28f2df13ee2e72c7fbca2a8557fa146c9b1 0x5679bfa87b72337afa9f5b11d21a82bcee3dcb32 0x458f36ffedebde4afc724bea6d27faaff49ed25f 0xce0ca058408a412d865b64f1713334fa39b864ad 0xad7473f73870578dfd6d62390999cea17f267e37 0x39eda79f7238cf051520ca2d12d4bc77fef1db80 0x21acb73b553d4e23a793e946fca0490cba65e853 0x499fd90d73229c244a12850be00449bfeed6c8f8 0x71bed94fe57ed63b41cac060cd3a82048152d071 0xf29b054d9c114839c11e70e428d49dfe5b5f2b1e 0xedd5fbaf6cae18f441addb354439ca4ac35918ed 0xf76a6da1c16f3c648532439915a25a09a513baa2 0x6e2f3f0d46ed29afe042763594fe372b8385658b 0x0b58476320151310c7bb45c8b278fc61eaeb8d6d 0x7a128985fb5a72d7417b55144a7093ac1f208ca8 0x5fd3a980b41fbd1c31218ae4f4b80cf90cdde25a 0x7045845c9eea923905490d6b02f916e75571f8d2