ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8C30FDEE7C92
|
Infrastructure Scan
ADDRESS: 0x6cb92d3630a10d229450378e93dee1c19a5bdadc
DEPLOYED: 2026-04-22 19:46:35
LAST_TX: 2026-04-22 22:36:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x35fe94c1 successful. [FETCH] Received 11 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x7baa. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 3233. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 6e5c5257…cbfc934d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4fcda7aa97db232cebd98b3b73391be02f70bf34 0x05feba1e86be720d4de3c2206b6aad667a4a45b3 0xfac5df3e983a32e947c4e53e112080e28de6bac7 0x60a36e1b5388687d26d894bda3a2831a4b3ad804 0xaf37149105b7eb08dc8d0cd68bfc7f56897f7b57 0x7a7b2992e054a6a45f538df3956b90c053ea9bb2 0xf1a1ba35b7b431e3b62219726363b95c3f15725e 0x1b2709e0e6ece46639b58674fd79b20bfe88e71a 0x2aaa11454f93a996d9bd4b0daf1237cdc092b2b5 0x88b47fab2d9e5bbf4a3442483cf83fb57a973ab8 0x945e14edff28a5549048168098a0fdcff67dc613 0x3ee5a5cfe623489b7a4b33a0e727b5da1b59d650 0x747f7c918d65f9acfc5f64b727b7ba14d2a3cbe6 0xf7a063732f26c195fb75418efd14dcbc9b7a0ab5 0x6d5b606004e945512332eba36489eb15801de922 0x0ca5643ab59b0728dbd9b936b5ccd96f21dd3d61 0xe285be3fa45834cfe7920cbfc05983aa18281b68 0x62520cec2c4331d7b11ffdb24c6f883a2534de71 0x96d82f6bbe9c2c6f4c5c6b4d255f0fef75003197 0x56519fda5e79c739f597617fb880c2da4702e6e0
796da11b4014dd2f9b49aac57e178322