ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A840736A2414
|
Infrastructure Scan
ADDRESS: 0x31ef8489aad3f94bb08d5659d55137c0ab1614d4
DEPLOYED: 2026-05-09 11:56:47
LAST_TX: 2026-05-09 21:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 1864 bytes. [SCAN] Analyzing visibility: 3 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x11de. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: a75e -> a457 -> 1a0b. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb0bc7e2656c66d77e99bc6150acf662958ff9ce9 0x7009d14ec6eb0f7a83e194363ef147ea3742076a 0x372c834a6f251fa98da79471bb9c988ddd448268 0x03e1e94b852dd32cb58a630b3008d467deb5048e 0x79bd234002c19e7c50cb09eedca3b05c32eb0f7c 0x5684247ca31ecbec7f74f090fe1d424b1bf83d9e 0x904e1b2de24db35de57a610b12203341fef036fc 0xebf173af103baef1c6a01475150e52eada3348bf 0x3caae75a73ca533b308b020f969467562d0787b6 0x8d085d6688b5d2835ad2dce33b0cf6ced39db941 0x70b4e2a88293ad233525c04a444eb2813af1f0cb 0x03b3ae6f509db9e2cccb1198271d0bfaecf3b561 0x2fa07f7d3be68f1de74e7c86dd99a53c08e88c44 0x6e17ab063241425fdcd8e2c92ddfa1f5d7dc4a4b 0xd4d5db5ec65272b26f756712247281515f211e95 0x7e1b39c7ce31fa30a62e729802af89f9a915632c 0xe2b30b63804415bd7f4bacece7998e670454517c 0xe441f748d52f3e0bdc4325364a07e4560ed125cb 0xf837f27d72ec43e14054772b3da5120d9acb1bc4 0x226a7e99d3886b6dc4ee038e582b93c482104523