ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1D8453A09059
Infrastructure Scan ADDRESS: 0xf92e277deec98f47f091b5c222c5f292f876864c DEPLOYED: 2026-05-11 15:18:11 LAST_TX: 2026-05-12 21:00:59 |
Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 72BCE6C1. [NET] Fetching raw bytecode for 0xf92e277deec98f47f091b5c222c5f292f876864c… [FETCH] Received 60 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 49 iterations. [TRACE] Stack trace saved to /logs/TRD-8FE2085C.log. [VALID] Signature verification: 0x5ee5bdb2fad816ae89f138026e2acbc8df8c09721d31523d9aca0cf23d3b4fc4. [DONE] Report exported to IPFS: a6f61a51…9c727d9b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4bfc75cfecb136655b3383e2ae8de193c7634954 0x9585d9f84fbbf65ae334ec8d018e57e487f391a4 0x5eda5b381319b5295161692b8c0540d2888cb0be 0xe581ce265c24bb20f18c8528302dd8cc153aef74 0xc2adc9c6d269898d0b848645b0f0d047e42129bd 0x79e0a55c723ea46a6f0a8be2a760b149113c0c5c 0x572a7e97cbe6650fc9dc573f4d8ee41011fc0b88 0x4db1f4d159c7461d3afc15613ae2df92a90358db 0x02e534d98021736dc7d08ae983f193e4efb89359 0xcf6327ffd3ff94b0f35a6f378393cbb88ae99b2a 0xad562c24a56b2d73378c98d17306234216fd3c13 0xac8e33b18f3c3f56adb02df96861ece5f9b1f38e 0x813eb1acb4b312b0276dc91ab3dd7d08b765b603 0xfcb4b305bd3f6c00598d89c8650c0082795a43bf 0xa3e920d71142d071a502eea20d219bff08933708 0x50ad9461b9bdb454fdad4a8159f5c60b65e1ce71 0x647d19875fc4bcf2567cefbf3fc592a8d598113d 0x2a6c51e418b7593d49d27dc2a96a82fd0c170aa7 0x14bf34fa519e2b356184a76d5add22cd4f7938dd 0xfe48232537a5c46e2b8744cc55b602cf693ab1cf