ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2247801010D0
|
Infrastructure Scan
ADDRESS: 0xb1929e419be3946793a4bed2c984d3d555843372
DEPLOYED: 2026-04-26 16:30:11
LAST_TX: 2026-04-26 17:25:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xb1929e419be3946793a4bed2c984d3d555843372… [FETCH] Metadata hash (IPFS): 78edcce4…796b65c9… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-26C45F46.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x85e6d582a7a6c0d10c2b1521d34d86968d0a8864’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd00c522ec448618bb292afae3adb310185210f5c 0x38a38edd1e1ebdc0f4f9db6c79f69f487c3391ea 0x19569adb5c1be08fdeed06f92a99f6e52796b675 0xd8d7177cd539e79b03fa25f888eb6612aac3f675 0x36b9ad5a75d92be9fc0950b6e2cfbc5dbefe6977 0xa9ea746d86b2f7d43c163554f486b60a2e9553a2 0x7ad662e91eb1214a0efe521aa80ca995766aa81f 0xe290de03e1eb77c3581568e4bacdb50738f78d7b 0x79b7a1a660c33b5ec954e3b9949976fb213c9736 0x6d564335699a9c6ef659c8c19cd81ff4dd76af07 0x82690b436260ae5ddee20b52aa761e2250d7f67f 0x95a722d25d88117b8981b576f5c93956e6a41bfd 0xe96e2ffd275242a5c692487adde636e75749221b 0xfb17bbc05f0ee8b0a642795ed8f086e17543d7fc 0x99654de9495398becade15bc845689d76c9d9ea8 0xcb43ab33aa04f4d567b0cdc4a8c350cce02a289b 0x0cf266f9301dae3d220b4294013e493f57a4eac0 0x84d97b514af0b338f8487fa7f6e9e1749316918c 0x8d3873fe9923d8706cd37215fbcf110e21562bef 0x12ee073125a512d554c1c768da9abadcd9370034