ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ACC107C4861F
|
Infrastructure Scan
ADDRESS: 0xa9aa0448f196c465056b0743d025fbbb43ef4f18
DEPLOYED: 2026-05-09 05:22:23
LAST_TX: 2026-05-09 06:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
ā OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 2228 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xf0587373 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x71ed712aa19e8ba8b523c8b6701690f5e10578c1’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x077ed662310bfdfa98098752145947b3089b1195 0x4432af52144c734f6e48192611f0d83ef21d69c5 0xb334f0a72a46c697e8ca934ae4ea0fccd48ff3a9 0xa18610b9c49127e68cac971851cbf729d815b4e7 0x064edbaf92f6616e6d43b8604a886ba3f5e9c748 0x683e8ffeb1cf1a2d5b8ee962729bc16c54de2c9e 0xed8a55b9f0ea58b57c2816989fc3935fe8240763 0x8204d7bc47597ed924cfba853af247aa0644ad80 0xac442e9d9d7960ccdb09f8ea61f94d91c673f76b 0xa04dd87172bfe307c6cabc073217a5d984497024 0x6caac5e0b8de5b7bd509b86507fd244869093060 0xc8cc7b69af1ac61c523572e3d063c7c67cd6f26f 0x51d7cb8f1ac2b547c1cd83af23335cf2750ca4d3 0x4fd0092a80fb7a643888e2de1158b77dd23b4999 0x94fb40391e80b91bc4121dd7e2a5858d2ff78b14 0x6fdb3414c70400407e6102ed081fd9fd44b3456b 0x3dbcdaadbeae3f0bd3cc0854c6cfbb53de0bfc0f 0x7aee543fd2bd2d21c345fe23f78436d8e75add1f 0x345bbe9fe36770afafaf6667e7ac214bc814314f 0x2ea765381b4c066b16d71a09abbbd73cf68f2e83