ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F0E810F01440
|
Infrastructure Scan
ADDRESS: 0x40af7d2252738657ae16d3cf756311a59c8d015a
DEPLOYED: 2026-04-23 18:46:47
LAST_TX: 2026-04-23 19:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): a8bed973…74ea96f9… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xe3 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: a8bed973…74ea96f9.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbacd54e1343f2446be16336a4d173629a22853df 0x63dc69386dd84191965c54e67896ebe6d5306675 0xa073fb348ff3950b224471d67a6e3244bd1eeb22 0x5405d2362f63e214494364a49ac7ee55c1fd1a47 0xa9bf68e832a9bdae3395523a3e134d4ef79f10c3 0x604d55a5f4546c7f05ae0f28ff2e898245941759 0x0e367305507d034d8a1b6fcf8eef3d5e7b0c17ae 0x33042e7d5db64fd04a6915ae6bb6c5e350aa1a3b 0x931179120144179b2a82933829531f64fc4ebb7a 0xf7bc4284c7fae313c42436d2f2a28ba3463bbaeb 0x1fecbde6aab2cb32db57dd72392ec311713289fd 0x66342af32e0003500d694b5c490292b47a8d265d 0x185a88ed98f36ace532c9825456b9ff40c5c01cb 0xab7afa3e34d28bbce2c08471c5ef2e692bb8575b 0xedec9d3e604d79958ab211e7153eb01380c8766a 0x0ce9dfe4a91c496885e6484034720439909effb9 0x039f5ed5ed596f722a60595e704603c2e1df35f6 0x8512959186e521a7ba8658813ee2f869a85d919d 0x32e2be371e99df882602926772280e95ee81c8af 0x3478ceed836bfa23e1b2c1a6ef2307ad5c140387
