ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9166255A4EDB
Infrastructure Scan ADDRESS: 0x4939fdf9f7e0eb7e5f7908baef4ea9349fa189c1 DEPLOYED: 2026-05-10 13:59:35 LAST_TX: 2026-05-11 20:41:23 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 61 segments of contract data. [SCAN] Identifying function signatures (0x6a1e3806). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x4d analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xe66348ebe095991d67d27c066fc6bc897a98d674’, ‘0x’ . bin2hex(random_bytes(20)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3d016a37b7d3374d84503d7920c9bba43ce2b1df 0xd8d1085b5de381aa57641eabd2781a29eb64937c 0x21ce358dc9dc4bb5fed0b816f84d4550c1a1a2f1 0x4abf9fca13f53733218f1a49c37f3294c2287b1a 0xd7120ce782a03017b0836eaad4cf9c6a38696ae3 0x1348f4edbeb7d3cce8279a13c642a863b70e7746 0xb155f3d2559545670cdbfed60762c8cca538edec 0xb39aa0b26fca7f14c92e8a58e32f0f5430a5efd4 0x2d64ff8aa10e3cff6f1b1fc900b06a21c0cd4c14 0x63cfbc1404702f6831969fdbca5227df60d7f862 0x0246687070d924c7585d2c76e12f255dd5464293 0xbde310e2862f1a3c7abe443d46f851aed091719e 0xe3df3c1b97fd8b6ec91b18a22816e9e45cbe2521 0x93dd0e282ab5be585f24152530e19008f23423cf 0x5cbd5ea0a46dbff7e64e60d5c5830adc8b7a17e2 0xbf515946136013fc4a6d4c4f18ee209bbcb47db9 0xab97b913d266328429f3c262ec2ad66ee5327e6f 0x271f50439ed441986ca8e527af40ddbb001b4b99 0xf8430081af99985de1a60dd9503b3ba64f30791f 0xa49d46022705515f8d63c24dd7772493aca70b74