ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E3A91B873A81
|
Infrastructure Scan
ADDRESS: 0x9eb501facb339276893692a626fdad907f2c57c8
DEPLOYED: 2026-05-12 11:35:59
LAST_TX: 2026-05-12 16:11:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0xe9 analysed. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfa5e5176bb519e929be32af65d12c086ab90df16 0xb8e48386fc601c80b8651827e4c2d34ed2e7b32a 0x99d96d0db00c62f7f2adcf276e8544d3ac23fbc8 0xb636e174d445844f3b7ebdd7821cf6fc74bb4e88 0x50db20f4d53e87b13c7db28aa04a2ef1cee506b7 0xa2f5ee8d6e6c273d03feb7c327431d6d3227e1c8 0x5d44133d9a2e92bdf1c4a9d9c335ed204ffa998c 0x5e31622404093a90ec6a499998bd44d7b51640af 0x187b317aad723a5d96ef7b12952312154f5fba3b 0x2921912257b9cbf5c7fd7fdea93da72f6fe55069 0x04b5633f107c0af871663d9e88dba859e1b0cf66 0xbdd9912240deac2edb65f84e1cd1f4c98b0cbb2d 0x24b428970532eebd074623e2e8087698f9554d87 0xb2d35f0f98ea0ac2a88ee0967efa2996bb75ffc2 0x8ac9856aa356f2606f34e59bb625debf9a995914 0x7009d14ec6eb0f7a83e194363ef147ea3742076a 0x4868dac9a03823fcbe157d4b70ceaecb171bdd28 0xbebdce1de12cbe7a3abbb573673171a0b2b519f7 0x87e696170ecb4e2fa5ed28728cee024755ce9d8d 0xbe2fed4741d3c08429f0a1416491eea8a73e7080
