ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1EF333C46400
|
Infrastructure Scan
ADDRESS: 0xf426880ec09a73c0dec936514a2a93ebc1e9b25c
DEPLOYED: 2026-05-14 22:38:11
LAST_TX: 2026-05-15 00:14:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x25dcabb6 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xb9b6e8b4fbf7f30c83f60943d0fd58f9fc80cb05. [TRACE] Execution path: 76% coverage. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x43baa3690fd0f4c5d6c516d596f32e61e4d708f3 0x50d1e31ecf61fe15f37da997ce1a08b888c334d7 0xe3d1ac3b87e8dc46cb4d006cbc8db20f26d99e8d 0xe21efe288cf64b8ceec71ebb455defc4743b0a7e 0xbebdce1de12cbe7a3abbb573673171a0b2b519f7 0xe6e6ad4cfe3235c99b9a75b10d26c503e0aa832c 0x5949148c904f37fe054a89e5795160d90124aa55 0x26d73e0464c594a3d10841b3dd1402f120d90ec3 0x0076e424d254fd4ff8fb2d31f991dfc3a98ee3b1 0x49e852377b10fb84ac37f053bbfdcb0a9c178524 0xb42d270675027a771a12bca8e8f77d3832be21ed 0x5563432a9bb45e8716c41787aac73edeeaeecfeb 0x2e171fde381fd63471cdf65cb65873b760768ac4 0xba50920e2893b2784d99ccb2a1cf26bdb41720fa 0xc7edd1b1201830de5e35782386cecbfec77f4173 0x86bfbde536cdd1a9ed08a2fac786086ab44797db 0x4bc5d35d9bd31209b9a5bf13bc260f5fa77f0dbc 0x4ba69551cf74fa89e1fa25ac8c06e888a807a360 0xcf33862d21661eaa7e82c93b282eec2ce678f7b6 0xad348f0a33e26e62bc50f7abce397e7a86576205