ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5E1C87A8DF44
|
Infrastructure Scan
ADDRESS: 0x2b740bbb30711a57d56022a91f0814b1f57f27cd
DEPLOYED: 2026-05-09 15:46:47
LAST_TX: 2026-05-09 21:02:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 3 public, 6 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘A0593A54’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90d5c49b79acdf8e68730699d559a1693eeef039 0x00a7f388b03687303ee1dff1b9c1cdd87a9d4b34 0x4fda5912c845decfd34cc5b49bf7205865073c01 0xda735780ef405733fcb59d5e6480565c08f56bd7 0xadd99728c2be40d2e60b22a2ddf0b51c2b393a17 0xe25c41c0c1287be4e5a934b0e9f09864754e955a 0x56b5ce98390a2699253e9c6d606d20a2f4a14ddc 0xe7ed77616ba8ce5eef0e6405478962fc8d12578c 0xf793b6e434eeaf821d96b6cc7c79fc83c3825b2f 0x9bba937a1f2d257fff9173bb29d993e958c8f45d 0x2f0038a4dff06aed2851a4d3d24a514f4d6d4ec2 0x36ad94913faec1aa6ecbe76f7cea966830febdab 0x7e437a80a7e56edd176774104cb86dcef7587b4c 0x2b740bbb30711a57d56022a91f0814b1f57f27cd 0xa4d7db525effaafee4eee5bd9fd1bfe260fdc3a1 0xeaeaf253b2d73827115dca040722547ff3daad0d 0xe2ac7a8223f327f9d5f0cb21a6462de5de0c74b5 0x9a4944a7001fecde1303c88e36ae787a090fcdf1 0xda69e583bdce680b5376c9c795faef91bd636b9b 0x360c3096dee53ecf573bcbe8e4061418f10ad33d

