ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-748D4348AE92
|
Infrastructure Scan
ADDRESS: 0x76c61b6140600429f50de5ac987e41672047cc28
DEPLOYED: 2026-05-09 05:56:23
LAST_TX: 2026-05-09 14:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 7A816D7F. [NET] Fetching raw bytecode for 0x76c61b6140600429f50de5ac987e41672047cc28… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 4271. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘e692f942…3f8d75a0’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0cefe7bcf71b8b7faeb4ab6c86f70ff2ddf43cf0 0x4721a573a1713271092a702f72bab881716fca54 0x01b482326360aad6524288d3bde5d9d39d9d15aa 0x1d7b69e1086444c1879be6404ae69ce2a8ff0ecc 0x2558aaf028ba8b52937aa8439871f2b948bcc122 0x92195c14efbab72aff1259c194b8ff64a554a900 0xbe0c786124ed9812de170c18c4442c3ffd38b2bb 0xc7a44a76d7a6f372fecf932b8d9c2057c7b35df2 0xf7d24621d0ee94a32470a767adef2415da7010db 0x11522e7e1b29e4f6828221662c96b7789ccf20e9 0xaf43cd8ca85915ca8be7ee89522f02a550a32def 0x048a3bc34d3a63d160906b42d4718a3c41aeccc1 0x5e3f134c6fe8bea9fbbf0784948703c2e8bcaec6 0x4427dfdaaa701705e053154e70ac00a190aa97bc 0xfc0dd27c39b1cfe888c13d4d54a1a7a4c058b68d 0xe31917f43448abc218f21fe9ea700bc8628335d5 0x5c74d5fbae7df174458fde3c1a669fe098020274 0x87014ef7d85cc900a0a354dbe478ae260e212e96 0xc177ac06be6ae0b86b495959a83acef02266d46b 0xe3f9b021abb287fdbedd0c011a0a399ba266a3b7