ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D852FDE5F6B8
Infrastructure Scan ADDRESS: 0x1adf7f977ab5ce610ebb22b90082bef034adccb6 DEPLOYED: 2026-05-15 09:15:35 LAST_TX: 2026-05-15 22:09:59 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: OWNER_PRIVILEGE_EXPOSURE |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 69. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x424a. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 29% coverage. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success). |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x76e7e8c944ca22f671a5a5ef3cadb2f0c16ebe1c 0xb74ecd6ae9efca9fab3169c9103beb92fd833b83 0x2f96bdd2cc9513838f3b6310b6f7cb056097c638 0x0344fb9f560f590b044133cb99876726b281322a 0x85e3b1f44e9d94b6019464c9970686579752ff95 0x10f579f4dc6a3959eeb8d5acca8f3c188d48aeb6 0x35d8dafb84a25a97e70741df3f3d5befa4d882b0 0x4213880cd084f6b0b50e3374877c443ed09e77c8 0xcebe4b01179912b177ac2a0ac38dc3a20af7baba 0x24d2e7a55bac748deca5bdb3334372967a22e1a8 0x2a0d7e3111649a85c475b77958df2d6aa994ffac 0x00f649e515fbec53b4a0a0554ae3363603153ecf 0x0776fc90ecaa5f2a7d4c8ec10d5bd4a0467e0224 0x8ae20e47bf4755d324a2a2b28359960e5d65f458 0xf4a93429be7abb8b6c37fa3887c43d7dfb559e1a 0x7a4ae815d561d267a0695b0fe8fe7f01728ede18 0xed1a02981cc707c7add6b1c893c458de453fb538 0x25412f64a224db1ffb4f7aa5480a84632be41281 0xb890f4ed93d35c1d90ae7c2a3361cfe5e404cd26 0x5aaeb4ef617e65d877d5c35721f244c66e52b325
