ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B0470F2AE9B8
|
Infrastructure Scan
ADDRESS: 0x8e73f24284d15f6d901f65f6bb8754cca43a052b
DEPLOYED: 2026-04-29 10:16:35
LAST_TX: 2026-04-29 11:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 4 private methods. [MEM] Stack depth: 4 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0xb1. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x31f3be13ec284c77e02cd790f9d6a86c4b75a7b3 0xebe88a5f8fed690914f37d037afbc964d03474bc 0xf345f5eb579e4949292719a879e063ef9c3753a3 0x851e9471784d226229d4ffdd61a526ceee31ec7f 0xb3fb3ad3406503893457620fd8a2143237957eb5 0xeeee0be958d822086d4fb8961570d57e5dd0fd15 0xcab614c56a8ebed98fcc99e07dccfb7a6a4ebe55 0x7b4600709175395c74c8d27ff290e8f1cd75e551 0x89e5529c3274571327eaaba10f4e12ec36b00628 0x04b63c65428d99d44770197d7cef8635830b7b1b 0xfc803d00685e4c61eec31f0e806dd77d1e9b6216 0x14fa6a802003b37bb01c9c6b6d6ded1d942aac4f 0x19fc28655b7c3833991171ffa1aca83fd8fd3b44 0xe934a2f9dae42d38f1376a92e3693123c7fff8f7 0x92a37a174ed8ba29a09d42e0ec575332d8b77140 0xd2efd48a805c12535432a0ffe24e75a9ee17134e 0x6495abfff0180a0060a2d80796b1e6e74329fcea 0xa7c09c99af4b6c975b4f959af780b178508522a0 0x2ad3946b114ed0c4832865d4c1648cd0b16b938d 0x31b5b4fadf20726465c8d8a2a2535e618f4de66d
