SURVEILLANCE TRIGGERED: 0x31ef8489aad3f94bb08d5659d55137c0ab1614d4 :: Operational Security: Trace-Log Interface Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-91D0B8FA2ABE
|
Infrastructure Scan
ADDRESS: 0x31ef8489aad3f94bb08d5659d55137c0ab1614d4
DEPLOYED: 2026-05-09 11:56:47
LAST_TX: 2026-05-09 15:18:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 31FE02FF. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): df4aca99…55813631… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: c160641b78bdf137. [VALID] Gas optimization score: 36/100. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x696e7b1d5d11e2cf7f7b970acf54cf1491f17a47 0x651beb336af3441c037da8e442f95a439f695d5f 0xe5dc88038eb43664b603485d588032ddbf87118c 0x6dabb117104495198f117203c44d726c5b18cf4b 0x0b55345c640162d5ee7fd36ac0bc08787d0e8c29 0xc66d7db9bb3a680d63477930899e4fd6099e60a2 0xc7e436b9aec8a416f79af97e8c3d2ceb4929b3d2 0x40bf202b51226021bf3edaf29362d0397e3be373 0xa8e5e8b0672bdc9168dd7b845c3ad59e3c97442c 0x287c8abbaea9fbe50c5c75ea5fd1c3ecadde3763 0x05394d6ee2746555faa7e6a57caa3d73bd981ae9 0xc82b3478bbce896588ff7abf503e595458f2a2d1 0xdcc57af90a9718c3143c74dc483da4210cc74aed 0x9e4f976f5d022e6bd23b9787684cdd2df52c1eef 0x1a08ca0bcfa3570dc6dcf0897721d3f3c2fc9ac3 0x5795198fe1228273505b7c5758f4b9434d224d6c 0x01d44b8d9cfde00c58e273387a35b53ad1e528aa 0xa67245fdd405ac165b99639f038fc0ffeec21c36 0x19f1595c37a4540998c38611c28e8c91609ea6d7 0x9a3799f093d44a9fc6c8f1209e2ad340e70944fa



