ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B5D9A94AE521
|
Infrastructure Scan
ADDRESS: 0x111527b778de3d36595cc4ed920169ce3711c158
DEPLOYED: 2026-05-12 01:53:35
LAST_TX: 2026-05-12 03:46:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x111527b778de3d36595cc4ed920169ce3711c158… [FETCH] Entry point found at offset 0xda63. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 4.86 ETH. [TRACE] Program Counter (PC) synchronized at 9459. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘a6a0c8a97ed7230c472bf2a47e4fca4a6da4c179c8b45a99440f3acc94d7b455’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9e0bb729822e442e74504847be1ebbb666fc45f0 0x799b766409372936f11f2308ce99aa3e0377b80d 0x2ff7023890fc9100b2728358ec4d55a25aab16a7 0x9f69a58bc788802cdc95704d3cf8707f26625bf8 0x4d6d6078b5445108d18055e2b1ad092c668c96fe 0x3965e7393edbebf95870f8061c80be32967cb87d 0xb169caedc6e6c36e99925af6e192eac9def118a8 0xbcde6ac56701d391b7787b8b81e571176fb4f300 0xb2854d62582c082d5630702748393d7757026f1f 0xe6e93a8751d38f9035df83da46fcf7563fa4b50a 0x6857f9c629a8341b0b24cac27b3e74d2a801a529 0x2735bc67219ca9fa3f1cb8c9bd8b88c399e661b0 0xa768da79510a0ad9a4520ff339de5debd686f65f 0x24635a551a6eace53988351320d48ad3336882b2 0xebae05e31ac8b52ea9d301116b0e9aa923c65bef 0x758a0c24651df56f6444cffe36429fc576e90638 0xb6e04e15298a3ae18e83658cbe09cb1d367a9baa 0x0572c1754378c2f9aef51b57b2830d343ee9d186 0x000a87c6dc2550df592e76a2dcf4c6748010fba0 0x42835280e3200f1ce5564ee6a90d8e05eaf113ce
