ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-45B718944C7D
|
Infrastructure Scan
ADDRESS: 0x4926f44a66721e5384116fcead7d6e7f721fdce8
DEPLOYED: 2026-05-05 01:52:47
LAST_TX: 2026-05-07 01:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 46727FCB. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-4C1C497F.log. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x271c9df74a615a44d046a57e50286ac7be60d00b 0xf6ebd92596ff85ee15887eae3dd4bfdc28fce23b 0xed7a6f5d8d0581eadc9fdd309f1ab73efed0899b 0x385deaeeeb2539efc9aa70345be4667a4b594b83 0xb35a5076e8011082bf5ddaf3c58f1c711ba422cd 0x1f118a247eaa267f3db499bc7b55509e72571a68 0xbe2ab5a90d59e1c582a39d8a39a4039ed247ce0f 0x160f2859d667f68ac49279c235f073608f66d838 0xf7a366b6b50cd61531fa1a5ca0503a91c7623be7 0x1c9d7c53ab7f3fd1aa02cef173906980a875aa48 0x78616307ca35d8ea77dba5dbed335d1250bddc0d 0x1db76ab070725953f47cc72c66bb461c37e1db33 0x8ce0197d4f86b5592d5a0461fe8f769578a741c3 0x3cf8b68c90ac59b20578c49656dfa2654ac13c1e 0x2f3bde453b6779d13843c95b8f6a322181761819 0x15ba48ae5d20f4724639a7cb03488da02516a0da 0xce963fdbd0468c532218c6d7b7ed3b4f37c171d2 0x0d3db4778d9b21dfd6ee5fe5943065e6708002f4 0x0813ee770aa80ecf123f434a24498580382ec12b 0x0a5387adc83a38bcdade761b256eec046624e57b