May 12, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52A83A8087A3
|
Infrastructure Scan
ADDRESS: 0xb212acf873f64a92e87bdfdeefc553fe4d735438
DEPLOYED: 2026-05-12 05:58:59
LAST_TX: 2026-05-12 07:32:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): dbf8101d…6fd04e8a… [SCAN] Analyzing visibility: 6 public, 1 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 8.90 ETH. [TRACE] Execution path: 45% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcba777240d1a0bd66c8ff67544a054862687b6ef 0x6d595fb504c194a4c65fcb051f6ced7c400e8552 0xb71d44ecaf05d07a8b3c832e5f57e390e00e5103 0x48dc423ef9e44a330c6808ff9c003fd98f54a518 0xfa5dd9be18235f367eb1045d2a7b101c0bf578ef 0x7d3c026c18e1fe71e14a8419da56d5d9f9da1c7b 0x68fc5ace15d67cd7be6c14efe1503e1a8593c27d 0x65240ac236b1eb55db12a5a384028f585a92a41e 0xfe936bc04a94b1a96a45cc1c8ff786ec403f21f7 0x48615e9553b7a0b6fe36ca04d1612c6e4abcbeb2 0xef43e65dbb303dc28526d3350a4e590553797f36 0xecd48a9130646146d082fdb6ba99817cdc17e7f8 0xdf63df807c6245ae1ad45ba94f4d269cb188fd14 0x8c162771ee30286a5889d79c234ead6f4c8bf0d5 0x76797b2ccb6f4cfba0f751a222ca11faff5e0c02 0x1e23b13637871bbc18f4b062c92f9289705043e7 0xfedfc73bf26d72566285c0a94d74406d9baa06d7 0xf354badf312072c35ef4f19d5e38b03d2b23420e 0x159a9d29bb1e1f08ac087e7afb4eed62c2b5e551 0xe6caa4226ceee3825a53f74b8106e1fe14104530




