ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE6A58229CA1
|
Infrastructure Scan
ADDRESS: 0x8a81e17817bdadca64dd4403b246a7dda624c8aa
DEPLOYED: 2026-05-11 05:13:35
LAST_TX: 2026-05-11 09:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 29c9cc49…5f74e799… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0xb46f3e12 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xb33b44ea93394a97d21eba6b1f87507c3b7fbd5e. [TRACE] Debug: a82642033793a4e0. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 29c9cc49…5f74e799.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3ae20e6e8e7c79a1d44a9dd046b48f02b49cb92a 0x3de39d391057f417210a461a850716dc2c42741c 0xbda3be64eb97bb0b74535ac6768378e4e2f16c7a 0x72cee097a67389252d165cb00a027469fdd07040 0xc03b664200651d9a8068c6ecae6a294f708c5df2 0x4585168d6b9c49a8cff998c140aefe6b99ebb2b8 0x05e5ea6f47843e9e4cd8a0c9eab149f3634b2a54 0xda675da104e1e5b1228cedd681c7379102646dfd 0x7ebe68a8ab781510a17f32e14d02c7ae756e9efa 0xb8d85786ae0834f4c4eaeea95dddc8292e134227 0x44689bfeb5aa07dce3ef887aab7871053f8b9767 0x22e4672c1969b3194d331b1ef6fdfc6ffe2f09e3 0x5a8564930841ef7eec2f2f2d3ff5eb3caf7764b7 0x9fe4ad1ba6993012cd457e2c39f867f45dbfd8fc 0xdba66d1251189c44b7417ba6058e2624e638fd67 0x688c667f76bf1788f3ba3e4128791817c9059494 0x90574d948363c492f3f1471752756f3b99d27634 0xf200698367b47cb349d11667146bf08f1f9af936 0x7fc9c0ce24ccc72bedd5c73946ac073707900ad6 0x0572c1754378c2f9aef51b57b2830d343ee9d186
