ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-008397C1B24C
|
Infrastructure Scan
ADDRESS: 0xa6701fbe7d45fb5ee7b9f91451b8f4fdfb3b64ec
DEPLOYED: 2026-05-07 13:50:35
LAST_TX: 2026-05-07 13:58:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 69ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 5223996c…4f5da649… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Call sequence: 0ee5 -> 96ea -> e66d. [VALID] Signature verification: 0x4c65d7807b5c1a455040113af78b436b3ed8ffdcb40cc73ceb441c0c66d58e5c. $line = str_replace(‚E0862486‘, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x81169736053a4e49acb49c4abb9c515f8593ecf5 0xfcdf316762603debe76ea86597fc2bd72736c69c 0xcb875ebba6087e687c754462cff4b75e9ee2e711 0x971594f155a823bb87cc96d03b6094862a67493c 0x7009d14ec6eb0f7a83e194363ef147ea3742076a 0x9cfe11a1f174a18fc172c72bc2b9257ebb876d0f 0x37d58d764e664c4b76633acab0e64b82bd5a9760 0xcdd3b271e754d813aeefabb4349d9416210db66b 0xda36aa38f3f4a04b78da4566e035ea0023ddbe6d 0x12ecf84681212102dea5ccf8b5ef295bf3e8b1f1 0xa9b9d53013b4ac87c65d11c721edf79f9439d9f2 0x28beade1a0d9a02e63855a6da75a299c4478ecd5 0xebeb4eba8e67c0fa3a292b6efa60c84388211d53 0x57be98622c290383f204331bbadc9ae8ca4cc12f 0xc434f3fe3cc3f1bf06c81a24948472e3924a9616 0x228924dea30dfa8c2cd4d0748132e1aabe596ebb 0xa05fa8443813b27f01cd5f6395f763ed10777db2 0xfe9c2c077d5d1c2e39156c071cbf1e803ba0fc0d 0x0ab546fe9a817efd592e96be964b2643e8920135 0xb11e19b94faa20208771f29dcba25fec953426b3