ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8A86A8A9A0B0
|
Infrastructure Scan
ADDRESS: 0xb92892cf4459e8c330ea501627357a90d1a0370d
DEPLOYED: 2026-04-20 20:54:35
LAST_TX: 2026-04-25 14:39:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 4.86 ETH. [TRACE] Bytecode segment 0x02 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 388da25c…1ce13899.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4fa75fc82a01a1d1b30e86e00c0bba3a2a130b39 0x02dfccbc6673c42c57d9c55d854c0c2687f2775e 0xb7816a02ba215a3f64eb9d599d9d60a3a9a58861 0xda4989cd5cf3a8cbc98e5c80f47133a2f1143499 0x37c9bf3b32a252cc5e22d39403bd81813ba02330 0xdb52fcbe83a188e060b2562702feda90eca46b49 0x085019b1147b9a571d0f7715246cdc499b989924 0x15bfd64b675feef4314cc0d74642f1ecb4be830e 0xb670cd79228e23333455d51eb95aa0ef0dabb593 0x79c91baf69a8989e716e71c6c31dcbd10f25e0ff 0x63e03094747b7e0636e5ccf2693f76443fa3f452 0x33eafe3dd4de753cbb129f84d37ec4cf2648c4d5 0x2cbe4f63ec39faa90f8444170179ebaedb0ebb80 0xfbbed7753286a1a091fd26ff9500d726825e29cc 0xa37072bfe4f7311d0597d714e8cda9d06175cee7 0x78b51528967998bf7b7299b14c26d889563090be 0x8a28d2f9d3c0ec53b45854e8d486e7d25d67b8e1 0xc098bfc0efd5cd71d7aa1aa3cb27c8a5b3f9dc98 0xc718d70b283adade92da57b4bcd8d582628c36cf 0x48f003ee4876c7b0564d5c3c80ec7205299ff978
