ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3618BE2C6CF4
|
Infrastructure Scan
ADDRESS: 0x3c8a5b2d8ea5e8e7a426b09cbb589bdd978b03af
DEPLOYED: 2026-04-20 16:12:23
LAST_TX: 2026-04-26 22:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.83. [MEM] Virtual memory mapped: 0x0000 -> 0x2374. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 68% coverage. [VALID] Signature verification: 0x4c7b450c313e40126d42a3cc0fd8e0896d63caf78bb89953867ae639900ffba4. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf2d49a0c8e4d57b6c6accb2394c1c772b3204c3 0x4b5bdfd12969b7584c189fd401115735b3ccce66 0x964e5e72e87ce913ca052ef13737a616439581cd 0xdc2a3c1df8543b6fc23383a44f2d66fbb11a6fe8 0xd2f175405d3c1a17a0cb009e83f574b09c8d4c6e 0x07bdf6553721d20d73199fb3a8875888fa8f9a43 0x3bab8742aec1306378db7a383b1245f7866fdb6f 0xb1610352819d071b65ba3836bb1f16e459b0151e 0x0690d279238dfea625d1bbec77cadfeade03315d 0x4053d589f91fa93629debab63280c93e00747f46 0xb8e4f5fb04789f2c0fa49e90798e847ace87f063 0xaa6d8069cfaac7b9b7207d5d7c3e3aea7e5f3b69 0xdd71d390fa6087d7ae3d2ae3ac9e5a6bc2e1e570 0x521db2cc18227b5fffefabc0fb4e7b870d31b075 0x02b19901b67de9925b4aaa262ff3e3971d8bcdef 0xc3c3d817a6b77539d725ebe53c1fcfe0cc850199 0x2ae898fa7524850e0fddf4c12a8b636bdb5cb6fc 0x1d50f3cf6d12df833a29083bc4fe93cbabf2c994 0xd3fe38ac333847be2e967031fc4fa24c42738cae 0x21152e8bcbbd5f0c65763509638ec23204b4dee7