ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CF3725A4E7AA
|
Infrastructure Scan
ADDRESS: 0xefad2eab7172ddebe5ce7a41f5ddf8fcce4ca0cb
DEPLOYED: 2026-05-11 15:39:47
LAST_TX: 2026-05-12 02:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xb6caee24 successful. [FETCH] Received 86 segments of contract data. [SCAN] Identifying function signatures (0x799f076b). [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x3b analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 69223d34…db858835.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2755308ce6567a0e05c6a737ffb7c8a335bd9e2c 0xd242105abd82fabc3c928baeff08ac4bb581adf2 0xdffa126dcad2bb96d8e2b50069eccfe36f7c174a 0x50d37e4591cbb18719bfa85e3756cbdd0bb8edaa 0x918f9ac35657301819716e9329372bac191e0a8d 0x0213142b5c29408f63921b469d30a0f4c2a45975 0x9edfcffef078891f676166c00341efd06b8e6664 0xd162e93c1552f5b4c2fb9ce9890614411c3e36df 0x3d48fa47f5118cfb22862c004c23542d4c62f94a 0x3b61c35fbdf7553b5b32e9910fa7ffbe89418a98 0x8655d378ce673851da2ca53eff57e4d73dccde07 0x0fec5e862bff84b04c4c7f814d3dec7048dfae64 0x7623bea863e98bb33d86844d59208323f0a6873d 0xff313e26a44cb47674b8c733103213008bf69fde 0x7663f7e1495d8c2894438c695f60327bf9f55697 0x004885ae2b15ba6e76d0e93c112035afbdcea152 0x61f5c10b468a72f0306f6c30fcd9024f1cedcfdd 0xc7b60b78d0c0fc1c44299aae20eb3fac95716c41 0x1e338291be05e49e14043ce7ee2b33502c48f796 0xdc28e7f038c94841966dd7d4eee56cfd28160b12