ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C02D6B3787E3
|
Infrastructure Scan
ADDRESS: 0xf5b42ba60e9883d1b5e1673c65d49263eb7e9bc6
DEPLOYED: 2026-05-15 10:05:11
LAST_TX: 2026-05-15 10:19:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xf5b42ba60e9883d1b5e1673c65d49263eb7e9bc6… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 1 public, 4 private methods. [MEM] Tracking pointer 0xb4681a52 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 4b33dceca2d11c57. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf9f4ae491026fafa9073595f4c2baa4c2233ae43 0x7beba27222679f6e56308476dbcab7fdbeafc017 0x7374fcb572c8908a9ae7c28b8074821075fd5f11 0x845f64673a2407320c2cc12e23b669dc16f7a473 0xe2eba63b470629186ed2d9d27eb9392a60aa9504 0x737ff84632ef9c42910a6100feb0eb5af6a88770 0x2cd14bb5d81ea122121219702dddd91a54e091f2 0xf43d77d1de9c254b76dacaec7bd8fca822e1d5e2 0x454bc11df3828c06d6795be09628b6465a78d38d 0xe3011477d29c82badbb90d5256c7411e462b8982 0x126aa7f9051b5528b9064bbca616e29dd01d8495 0x3577be17a73690d15d66df7b266c52c9ad359feb 0x4fb7b64b55fbaa1044978015790b4c37d2b31adf 0xc6bd1ce2d289f68874fff1ee44fbafac33466f3f 0x87fbbf0626216e05f8a2cae6c3cde9e53d19ca7a 0xb4eb492a4ba25371964920d84a468cbeb1a2ed17 0xb8d49e20a13811db817159002c9f04344b8b1868 0xfc1ea7641be80103c9708a7ad26099134df9f860 0xc7de6c13643cab99ed4a290ac339c7d0aa8a0a5e 0xdb6be5af3465787371d4440cb3e9a8206038ad77