ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2101B841953C
Infrastructure Scan ADDRESS: 0xd90046ee43226196924741b8834499dfa5044e21 DEPLOYED: 2026-05-11 07:36:47 LAST_TX: 2026-05-11 07:57:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 8361 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x1fe3. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: f586 -> bcf1 -> 05c8. [VALID] Gas optimization score: 91/100. $line = str_replace(‘e618f4c80af14812cc15fbebc14233474b3d0d4c28388a784a2ecaf33e57e1e5’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbef7ff9ff557c7db804dd45c8715fffafc11803 0x58df1cf517793ee543d50403a1b1e6bba5bfb25b 0x198fbb2fd894e946214ba0ca7cdc6ece8e1e78fb 0x3a735e3a2a3b20daa5b8963ca18324664408c19b 0x0faa7334319420ca12220848c260e8ad79d5e506 0xf36d53befa8c0537fda0143d4b5bb80c22fe5f83 0x19dd969fff6b6add3e6ae0c42624f4fc22bca8c5 0x71c9925566da822015e888c87dcbc2ef0fb1b1cf 0x21f15cc80a19e441213cd05df7ed532c9cced422 0x5d9fd5f9135aebb6ce64fb0b406abbed0f256201 0x77c67506e1bb4ed241e922e7b1606012dd78facb 0xa8f8e8a3937afeefcb21c64527fefc1ca3f751b6 0x57c6dce75895ca0184b5ef2aa9c4354c66ac772a 0x8233b1cd8631973e69cffcbc10efc4b67e1d9462 0x7bd6776db76e62e7fef0ff71053253e0e4d4d725 0x1713171adc06bf82b4f05945d742ffd351a8d1bd 0x01c23253544657dc66668eecf824523713753f40 0x31cf6a192f90e4d7c643fd13cb9934b49a1e695d 0xff7bc3346ff684fabe9ca6b3fa920d6fa2916239 0xf90a98430dc4e907590d22e566fba74023591784
