ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-917DE10CDF89
|
Infrastructure Scan
ADDRESS: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e
DEPLOYED: 2026-05-10 02:23:35
LAST_TX: 2026-05-10 05:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x103a4799). [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 27fbc63024214556. [VALID] Finalizing audit report for 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e. $line = str_replace(‘35232BC9’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc05b193cbde7a8387ad8c7b9c8e02b0846fef14c 0x36eef6fa7555fa53d81d34d640809bab569e400b 0xfd7db13b002f927891ab20ebbca890c1b5a459fd 0xd971e1c61123c9146c8d98579be6591b371fe3b9 0xef044aa771e78ff5ec97953e5f8aa27553376bcb 0x390e1cd77750f6c26fb3552e2c2888ab2cdcbe15 0xe97138c0e1e5823a8cb3cb7c5e6efdfec8b55a88 0x3f79c228ff97b0491d9d8cbda071df4a80338430 0x84b50a8043bde970e3373ea4d6ec979747735d91 0x71bed94fe57ed63b41cac060cd3a82048152d071 0x7553d8013fe9dfe697ef6ea1b61810e9a61024fd 0xf0d33d7bc0adf3536624f6f5b2cef34dfebf7a8d 0x6a514f59362a96e2ac7fab1c9ef13adc3000f6a2 0x82a000d2d8997d53a7930b180b1d44d347f303a4 0x6965a54e1edfaa2ebb0ef99943824b9a7df5b4c6 0x23428a01dac42f838c29e045d4c406083dd8f48a 0x64e8e301835b04f62f66b57004c94a5aedb37ea0 0x9708ed53ac97a438c1ef9b37973e1a65e24f85c4 0x81caeb03d88af083e8ab96f9d50264016795a22e 0xfeac0d38d7c392c5e6a4747262767bfb75d1f20e
