ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F6285EA277BA
|
Infrastructure Scan
ADDRESS: 0x67a98cd4e119797c359df7e9759dd3d812a633f2
DEPLOYED: 2026-05-01 08:48:59
LAST_TX: 2026-05-01 09:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 44915. [FETCH] Metadata hash (IPFS): ce11d175…fe24947b… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 9 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 8403… [TRACE] Debug: 3a5323e32242c59b. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 919416fec7c784a4964269c218ae8c78a0b6584a4013ff9ea2621ff7c9a5fb20.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd1573c10538a30629517624cbe3ba70f07a1ed75 0xda36aa38f3f4a04b78da4566e035ea0023ddbe6d 0xb5c50c5d5f038404f85970b7f5b7259c4ac0e198 0x4646bc0652067621992f017cf5af0e0b9dbd5b52 0x561a224d00f00cf8849701e75ee9c9d5e789e93e 0xc16aafa7245b35c74d7c12670e4265d3809984c3 0xdb20396fd58128f41684c0f2e604e1b5e4f0d998 0xfe7675bbb6ba8ad435fab4f55c0d38d29a42d8b0 0x2b33c8347be398d0876bdfc7d8253da30cf6faf6 0x8ab193441f387a026c4b7c69ff11d4530bd3a305 0x98bbf933201ac86eaa9a554413b827b77ccd226d 0x8c97ddf0499f44cbf36c27f9c320acae37db59e5 0x04f75a4d836b884d3d44b3b0eea3f09e52bc60c1 0x8241e5ebfc13671a0e130f876785192f00bd7a8d 0x172524ff7b2188f2e091c3f680219efdc6f71997 0x064bf73a3e934e79eaf3791d705d7f0da3bdd97a 0x50560a26c5c899403d7615c0fd75381e271ca13a 0x403ad645feef27611e18d5496500c90dc63bc8d3 0xb1ae943eb4c2bc6847a740365c74e6fa3982fb43 0x25138d10837ab0278eb860454e1045f2b92929ab
