ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FB36003B526F
|
Infrastructure Scan
ADDRESS: 0x4c8911e473106d22287029b295f721581b160bbd
DEPLOYED: 2026-04-26 09:41:35
LAST_TX: 2026-04-26 10:52:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 61CB1937. [NET] Connection established. Peer count: 48. [FETCH] Bytecode size: 6420 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 66 iterations. [TRACE] Stack trace saved to /logs/TRD-B889622E.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6a779da0902e74b846d13867291712daa59483a8 0x2cdcfd127e837219dfcab8c6802a11ce22bd3626 0x0388a7df1b25b96931ee1f47055846fa25f6fb42 0x90892bbbd6700dcd44caf2fae9151a11a67119c5 0x3f3e3e3dcaac165be4703b05748a314aaf87cd86 0x79d83b34745d0c68f46454506f4bee570b49c765 0x0e9b64b1fc056730531744db5ace19c830b2001f 0xb5f8efe78ea00d96def73a724839c367a00ac1a4 0x322ee0c8644bc05d82c1499f2bbc26689b106330 0x6e3d0888fac9e7cef5552f3bc2ad1f8d4ebb034c 0x60089fb5aa458dc5768754ad617cf95419af9905 0x318168edc620e031387a3d85192219dcb2d652d2 0x9c8d0c5e337d917f22ac0945151507eb1bb748ab 0x635ce8d1225c38ec89d6dcb159267e793ddc4132 0xb72ded7facb14d921291881b51b2b6e43ccaeb10 0x0c85e2ef63c1fec78ebc4195979e296af5718a3a 0xce1bd27cb6cbfcf422f3c77a457eba16c504467d 0x1038c87766e36d1925889e6f26d10e0012d50fed 0x72270300206d0bc94f894471dc044fb8d99b8e99 0x6eccd9618d918182293dc18d3038985588bd8a82
