ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8C30FDEE7C92
|
Infrastructure Scan
ADDRESS: 0x6cb92d3630a10d229450378e93dee1c19a5bdadc
DEPLOYED: 2026-04-22 19:46:35
LAST_TX: 2026-04-22 22:36:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0xce010463 successful. [FETCH] Received 11 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xfef1. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 3233. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: a469e993…9743b2c2.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa19943cf9899fa863bb85d909e85c6c09432d91e 0x2a3ac59341131f2a0d03af3a867148b2b9b0dcb8 0xdba43cb87bf3e65ddbd86cf6baf3a4b4df2ebf91 0xabe317e84e7389855657d0d02daa168e02a7c323 0x950b1f3703760aeeda4b82c8e1398b63432eb7c2 0xf11ff6bb31723528de022c83f173183f458d6642 0x63fbeb05d52d58b331394d6681b2acfc03dd75a2 0x1a75e1601713b765477d5618a737cc2a87c9cdad 0x2b4aea111377d6537b9e3c17f277088d1569e7fd 0xb381b28e423accdef2b6c7bf83b6cf1357e1ce58 0x4472f300310e3d2e200c9a86a7f36a123206f8b9 0x591dedb075510b8397a861a965d6694444c75c24 0x9d24e69ec5d2bbbbecb4cc1d4fa5ed200db7e401 0x51ddac6bafc11f724515120e39d03fe5bac2d104 0x56419111e502c5457ec29805e9a1f048da1ed83e 0x109a699db245938e44e96fe3d0c4f99479c98b1e 0xbfba9a961ea52f26e2dc53024ba8e0079c78a410 0x068e73e6e08334652a1674f64d8ddc1a86f2e587 0x297207f5264e6447a4d0320a43a8d3716ccd0110 0x96d82f6bbe9c2c6f4c5c6b4d255f0fef75003197
796da11b4014dd2f9b49aac57e178322