ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7F09CA8F1E6
|
Infrastructure Scan
ADDRESS: 0x8726d6fbbde1fecd839127a9fbbc6edf37c2e3ac
DEPLOYED: 2026-04-23 23:55:59
LAST_TX: 2026-04-30 02:43:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x14ae8baa successful. [FETCH] Received 40 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.69ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 96% coverage. [VALID] Consensus reached on node cluster: 1/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee606bdf08c64959f39c23a214485714ef94208d 0x1c9b44c2ef5e8fb014c852aca105370f8aa3bc92 0x0a1c803e11b313534a842607bcbf98a42a835fe4 0x54bb5b4b9c47c0dbb4fd226309c65ee75c70e0d3 0x2f46ca298322148fbb0ce2734f3671a5397268c7 0x65ecbea163133314f4cc2b4757f924e2c9beead5 0x9349c0c5beb715ae24585e5a2fd204f93fe442b2 0x651b101f72f82630cf59c68e6ee4305afbd3b1f5 0x3753d4429c67a61bca13f20122ac72bcdd6228a2 0x27442bce55c5c66461b2577cdd97212a1bd7af72 0x85abd997df998df17580a6be85e957decb582aeb 0xe911fa14a49ac37e79ae8a60bd22a5f6a78c85a6 0xd8e8c72afec564ee5bc88a6a713c54449fc56469 0x2e0947a6c46b839d91db0ae13b660fa62cf3503d 0xc1d0a77e74df50733e44f063dc82aa65ca630d52 0xe212de123d54bf79230629dea75d3c6f66a13da9 0x0583e793613c38c43ed5fda52d6306808638a011 0x2b7c1c79405c7d2b0b2af97315d7015bd5048216 0xf84b664b2f5b42e759f1e4b2111c2daa10e25cc2 0xc58dc66a3c4983b197c60bec4a356cbc5f9518c1
