ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C40B2E1126DF
|
Infrastructure Scan
ADDRESS: 0x23cd5c5730ee8bcbc822fb4e9013f7c86c593118
DEPLOYED: 2026-05-12 06:10:23
LAST_TX: 2026-05-17 10:47:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 7405… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Log signature: d3b3fbdbe81a63c73afc00a6eef10a4250216c567af74fb676f3c435a4f2c769.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb0ce9420ffab199838831199c0fd9c933f64277e 0x58ecdc3f83b2721fdc7d49342b1e6b3ac98752c0 0xf8a4901047562d5fdab8f63dbb41a6ac16055601 0xaa0cf5d77701cb53907d245b1b698cc6d326eecf 0x78d4b994e6b673fad2b1e9525408f57fb0ef685e 0xefc19c8cdae96f726adae26f89711771226c8bd9 0x01368baee30aa2ce588762e8df7eed1a664241f4 0x25d745b4fe4c94bd5dcdc18ec0de8c8ec5e18c05 0xe8a240bc80305680b37252fdee0855529c15616a 0x4fd7aad9cf2768b177519445a6027f5bd41458fb 0xb4e130bcb2d9108603d93df536ac5bfb081dd699 0x8c1a6f8c2e20e7bb3301a4cc3686a6683b828964 0xc19c2153c5127afa66200a4a1b6afb4f47b8ec7b 0x7ac985586a7d1a91fa1a4d2acad56e06a82f4cbc 0xf817fb032c1b4a15f8e8d08b516911747f032099 0x093177b9426889f72f398f79fa06d776c80c2d66 0xb518d0b48cb6293f7f86a53bf63592a870529129 0xcf28546f1a1cfa122c7f5f4c7642504ad8edde12 0x49ccbd640225c66d6f29d0c4ac1ef4c42d6c4020 0xb773c94e21c30014ce4acdb2f50f82a29981d70e
