ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8EA8EEB24617
|
Infrastructure Scan
ADDRESS: 0x7759c936624352e60ed11ebc9c41a1d93ac890d4
DEPLOYED: 2026-05-15 21:13:47
LAST_TX: 2026-05-17 22:51:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x8b5df1b0 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xda6c. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 3410… [TRACE] Program Counter (PC) synchronized at 9423. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘d99d01f0…1139269f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x63778db8dd71bf9c1856d759ff20b18b94fd8f1e 0x2c3fb3808c60aa91ff0712b218629090eb8a6217 0x392af4a6f6d028459c6ac60b1b51a4527a9ac363 0x2686b1b5469e61082b58fdcfb7efe28031199cf0 0x8b3849c997121bb0404cfdbaf13a3e9347fa37f4 0x64c71c563c7c5244e1cb31c9f0b806efad42fadb 0x0cebc517fd9354e92fc5f6c7c0fc9c731c372ce0 0xe0268d0703f1c9924327b3369a2b28c0fd172852 0xae1adccf71ba9045c2a8953189357efe15dd8cd7 0xed9c6888423e4a4bea025c80b1a7729ea0a95cf9 0x8e543da9fa6945303dd961cd8c0937c41164d8ce 0x0000000abb106e2cd3870bf439f33528b4f59f08 0xe3d1ac3b87e8dc46cb4d006cbc8db20f26d99e8d 0x2c04c9232687d4d68fd57f34a5682556157729d4 0xfed2435cb2e9a577997a76f3a72d4854a7b9afe4 0x1f61bae3211e327d26c74cc42d73d6ab17b05b52 0xa98af95b617b7de1c7cd698fcd4b70c2f4b9f27d 0x8cba8d17a2a81039d231048875acb7c6b0dba46f 0x36e66aef5dcb4cdc5afa08a7113277f11cedc643 0xe457b8ba2d97dbe69f6903e04437b0c7e2c4784e