ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-29C377F9373B
|
Infrastructure Scan
ADDRESS: 0x32c842f29aabb58a7f8306aceb15d45a33c9c2c5
DEPLOYED: 2026-05-01 12:49:47
LAST_TX: 2026-05-01 13:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): e814c647…a6501c72… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.99ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x3a analysed. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘cbf0574081e320eea0d42fc1168a6e0d69dcd3bf2947477696c48faa902e87db’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x076468a33ff4a6307e836f013cd5e4090ac4fc7e 0x4f1c5290c23fa882794b6ef6888c5c07d1843f29 0x13867f5005a59f413c3c140b57147b7c4489a0b0 0x671eb5a157328b46518d9d0d070e33404bae5758 0x733ac6b21fb9b3a4625a5c55206a740017ffee48 0x4ecff9ae32170bda9da5fc06195faca2923e3c55 0x4138609a2699b5543668beec2a114d9d8e61a1e8 0x47e74485eb2b823c9eb676301808fffd09007f50 0xc731ed030fcacb1830c5c280815dfa7f72402067 0x0d96a1bbf158ee798df59e61829f190acd66297e 0x8d1a0859032ae32fea097379abcfa84195051ad1 0xe462b0eac5cd0940a12e0e3509a654ebe4b3f76f 0x1c538567db019da7007c3e44272c457c58669ea0 0x9c37e7fff2b8a437e6f6f2e85b0f3e49e3c67d20 0x0baee689f5ec20f04587461749fe2077e7d201b2 0x71711db4a33775ea8e659344615e3971dd71112b 0xf7940991262f0dd6c1ca93256e13ff8b1f7edc71 0xb996d1e93eeb6fb74149747645f504858a48869e 0xcd83ed7ac2e1de3b8836d0e03ea5f7c7f8f112c5 0x50e45360fd94468f87b6e7b1b861cbe3648b06ca
Post Views: 10



