ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-88374D9F43A4
|
Infrastructure Scan
ADDRESS: 0xde52a8da4085da1a616276b0026a91fc48ba3181
DEPLOYED: 2026-05-12 19:51:47
LAST_TX: 2026-05-12 22:52:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 41f41cc3…5d961854… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Garbage collector: 0.33ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-2281A0BD.log. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’41f41cc3…5d961854′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4f31c94492f94d7676ad5c54497d14bd4aed9514 0x7175c4931ec875e3b4ca40f171e12d21b94238e0 0x423aa16a791af1a5fd58fe6cd1d4adf4e564e9bb 0x2897bfcc24a903410346e999dfc96185750345f4 0x93c6539e54181ba3ccf292dfca520ef8edbf1d9d 0x5864c781af761addde280082184ffa32c17582a1 0xfb8c508754015a2bcf1263f05b71766ae1cb6073 0xf4300901f0a5b398c9bd4aa74797b236ef1fca80 0xd1f18c2d541338530e3ca1ebf65d1ed1ab81aa6d 0xea8c9945352a2c0e36f9eb151112378aa8f42900 0x9efe104c2007b0b0f9d87e157dfdf5beac6bb763 0x016923495d0d0667790594f02ccbb5e8e326f572 0x007a562b5b649620d5fcff5d73ee908e8465ed11 0x9b32246a670309086a1078c2c38d98ef0ded2f6b 0x6857f9c629a8341b0b24cac27b3e74d2a801a529 0xfa8d494407b8310930b9bf1d1665005a276ea41f 0x88b1df0ae2b7f71adcdeb40e4c65d172dd752373 0x7ebe68a8ab781510a17f32e14d02c7ae756e9efa 0x231f3bc8f608153a740954cedb93ac900e2fc18d 0x4c24a3b331e1ae4cd6d0da0f8c53627d461b6bf5


