ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CE91DA618A3E
|
Infrastructure Scan
ADDRESS: 0x906ff7a228fb22de57977ee2b48477e55b217550
DEPLOYED: 2026-04-22 03:01:47
LAST_TX: 2026-04-23 01:52:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x414ff348 successful. [FETCH] Received 11 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x9da5. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 3233. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 77d9b3ae…8710972d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef69ebf8ae0e744c498f12378bc9d553d4512c80 0xd02a30cc5bebdf8da6e8c074e96dd08bb83fc80b 0xa7dd870e38c2d9b1ba8cf97a2b794ae4d044b6e0 0x241b981fbb6a219712e42ba87b87ebffefd9c68c 0x8db0eb5c40cff06fa3cbdb7010c7d063e91d7177 0x3e4b920dfc1a7f39f8a9ee2632d4ea58cbb5cb4f 0xfe0ae2864f2b3b7a40fcea7753f65def2b8cc735 0xfb25ba25c0c6a6b645656d37b0c877f0f355c392 0xd9de5a708185a414430eda010a3e405c828ae49e 0x8bffdfc854f43a79387ba666b5696a0ee7eedf54 0xee28ab94280ac9c0001ccdb898d34832fb1a97ea 0x2afea6ad502ff0b109e18efb7596aecc0292d81e 0x58142bde248c330ee429db825045a3f1ad8a7f32 0xc91f1dcdef616ea6d5cf6a9bde20ea9f2217637c 0x75790ab9a289ff3a058d7fae0afdb83ea168b2f4 0xec597919fcb3199fc1df04ee7ff7f718012bc765 0xb638473fe2e2ac93fd36f9dec9e69734a6a382cd 0xbcbc6ccc4756274ceec335eafae4b05412f71d25 0x4c0751959102cba27f627f595f2b1c44f59e9227 0x90fc15ac1afe5ce0938cf7d69c0498d2512f1df8
796da11b4014dd2f9b49aac57e178322