ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6D7969DAF52F
|
Infrastructure Scan
ADDRESS: 0x12b88712e145011f1e24c8f25921a67112e8da06
DEPLOYED: 2026-05-11 00:32:59
LAST_TX: 2026-05-11 01:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 803A7EDA. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): a7272c76…e0e542d3… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.20ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xfeb4b8c676ca890804abf5461e7a2dabfa37396b. [TRACE] Execution path: 10% coverage. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: a7272c76…e0e542d3.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4cf4b75de28d908e62d09e80afda6c97460985bf 0xfdbffcc1654bcf9d93219a3cffd2660884e7913c 0xb57702c8c914b2cb591c3782ad43667b8f18d742 0x7c68ecd75377867dfbf486a104aa298fd6378f80 0x1f6102a413d72a6d37479405adf14e8d7910032a 0x9f622d74fd49fe7204805b14824ef01b1cf04333 0x69a0d394d72fffa69bb0211b501d70418f1ed2e6 0xc7908f434f74e928f71bd3e70c98eadaae87fa6a 0x5c0dbaa1ac35c287e448c1e94f8b7a3d4e0eb460 0x8158119aab9abf19a57fb05b2da9ab4efada672c 0x68ec12aa4dcda1c71e941b68d429972b7e7663e0 0xab6a6c0fb8e0e1365338033036bf18fe8a0847b6 0x525f800ab1f49b223c70e5f53ee6b6089b85e9d2 0xf2015fb67e6d1f28bfc3b60427c979154de55d43 0xf3e6903a12804e9f5e4f05987efc5ae9129b84fc 0x4b398383285db14a46ebbd6eb0bb169e52b59c0e 0x005d1e6380ae8f1b69922ef52b71a99c3fafe733 0x1dfd7ce66fabf2afe4e4f44e979229e30e371410 0x9035c481b0695f52276e8d4c066d6c2d92319b47 0x1bb80d991db8b42dc25a45050290f8d6bc09cd63