ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-58CE967E247E
|
Infrastructure Scan
ADDRESS: 0xfcf6876b12bcf29698c6117882e49a5f9d568ad5
DEPLOYED: 2026-05-07 17:17:35
LAST_TX: 2026-05-07 18:00:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B68ADA8A. [NET] Handshake with node 0xebb34b8c successful. [FETCH] Received 92 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 9c9bb5cc1bcc9914. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x112ccb5107d334f0cb11c7114f85d21dc516ce0e 0x71fb6afcd98c5bd611712ad4b8d314ef729aa69d 0x44e323f6d1ae5729a9728081031e4c6caa2fd776 0xee1b246bdf9b791847bfa1c5ed6b6013280cdd92 0x7456069551736c3ee9eaf129dfe4daef54ed63b7 0xd2eacc07a2a1892edb55c3b52d2df2af69bee850 0x75b47a9ef8f03777df2d7017e8f573e4a8e81b34 0x3b1723e90264d16102af69eac663edf60ad9ce71 0xe29ef0647b5107ae26f7cde3aafcf729d6ebe4f9 0x8e4ca71fd6889ee9dedcb553b744cb470a3a025a 0x3dc72e90f682338792f20c593d090f93b4d37538 0x31204a81921e9d9ad90cc3f67defb11e88782f0f 0x9914f33bb9ae5de018c0c2ca5d5f5047b3fc5210 0x18a92970a38765b70bfaf0d10e126787e9f6a105 0xb4fc789e9f3c251cfc12669772c229ac4d9bc2fa 0xbda15939f9a3f30fcdd815bf8df774e092fd5b5c 0x0de1430ff14e2fcc3e4290cdc8c8d02abc683015 0x4ae1829c822db685ac1ef3bb3c5d2966e3d93337 0x0fe3fee27e22fba10abfdbf54a09a53a79fb4b86 0x7483daca3a27b6bd0cb0167327690e14f7c4c814
