ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5E0C379B8384
|
Infrastructure Scan
ADDRESS: 0xde54cde602ea0979202d99a779491f997a3a11af
DEPLOYED: 2026-05-02 07:00:35
LAST_TX: 2026-05-05 07:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 90 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task FFCB416A finished in 12s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf848418b2f03e9811b8bd666b1cce47aec22a161 0xa8ed0087e80dba70084c73785493d67738c3df5c 0x23698af4bee75b66fc29473d9f2101b844786970 0x12a9a14e052c8114775c8718855ed9613eca7a76 0xa0161aedd9f406c7d58db200d7c4727cefd33539 0x1201e35693a75541550eea6bf86d5247c275e55b 0x4e4d10979df587d9f4fb2efd2ecb35cb89d123a3 0x49dc1f7d234faea475ab74f75ccf00c873200f2c 0x7ac2e9ac92c32539021c885110f7158e24fb9ed1 0x82ce39d94fb2806f72064e37f5d208e24d13a949 0xfb444eea02d070bdfb128a88658713946cb530ca 0xb67ef46ccb300ffe2b2d3c1429c1b8dc7faf225b 0x53ca99a7f201f143a26d6db69a33cd02a113d5e5 0xf2ab0326117186b5928f1bed5ca43f2d3cacdf2e 0xa217f57e7ff446ded7fa69a1cabe9c0457ac4608 0xf0c493b1e604a24bdf7ad4773553deb20d99e49d 0x1756b2b23077f09fa120475dd34b5666ec6f63ab 0x06666c410367e7742813b62be41d8081242b23c1 0x0ebef3654f53001e72297bb42efebaec47bac3bb 0x5c6cd115be785c1fe8b42381758112bc6a227229
