ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F85798712DD1
|
Infrastructure Scan
ADDRESS: 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0
DEPLOYED: 2026-05-08 02:15:23
LAST_TX: 2026-05-08 02:45:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Fetching raw bytecode for 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0… [FETCH] Received 62 segments of contract data. [SCAN] Analyzing visibility: 3 public, 5 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x6406. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 86 iterations. [TRACE] Stack trace saved to /logs/TRD-1AB6FC5B.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘5D9E1A7A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb5b1b1a283af484c7db08f6aac40030adcdc0fe 0x6348451c1d6d278e11fb75ab7f98dfc5c3894f66 0x79f145ec07b209e782013ea5932c553b5f56ec3f 0x38889dafcc5c8ce8f62522e650cb76d958bca912 0x3cad995494954a8197391c4194bd39e2eda16274 0xcf2a0c2cd443f28a2d604917b7ba3b99137382ed 0xe8807f708b87096bad30ed508fb9975c0b24d8b3 0x2fae944890cf8414cdba7f3e3c7e049ddb696956 0x9cddc8e501787d501b8c96b6e3b45fc380322497 0x28dc8b865abb8c2010691122994ce02dd2116342 0x2c8d167f7cb5e22a9233638fee9bda585bb6942c 0x4271057772d61b9abaef106132d5b007c1d473f0 0xee7c657127285fa55dab19193907f8a4b6d80dec 0x38af1b6a8e179d891d62ce2bb0f29f64df09cbc6 0x26ad31092dda77ffabc49fa45cc6fc58608a2511 0xe8bd81b113ebf96e7605f6097456614499565b6f 0xc6a852ddb435122d25f35363d46771f0eef0f34b 0x68ffcef7dfdfaf70f593183c9acb88cd7887c75a 0xe70c6fb677fc64a65038c385e328d08ef2dadb65 0x994dd44d40eeca251e84a3ed012310f9807d91fa