ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C5F4464F8BD
|
Infrastructure Scan
ADDRESS: 0x8a37653be6106fe1885a3f61fc7cfc19854e525c
DEPLOYED: 2026-05-03 05:19:59
LAST_TX: 2026-05-03 06:51:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Synchronizing with block height 52821. [FETCH] Entry point found at offset 0x0c4e. [SCAN] Identifying function signatures (0xe631fb35). [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 1669… [TRACE] Debug: bb415da7b3de848c. [VALID] No critical memory leaks during simulation. [DONE] Scan task 06A80580 finished in 73s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0515640b40d6426f2c505a43663b03450f007d69 0x38bca071c35f302b9eeef86b2e1ec97ea6eb039a 0x61e3c221f3eea8448575e7faa19e87d6b6708529 0xbac247596445ed18de5724b1692a8683e9188a37 0x9ed61ee402693047ee540a3ef148bff0bb04e76f 0x7e7bda75e9f448742c8f01d678a1e789dd00e1b2 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455 0x2a867d6442293eb00efdc0d73e0a3bc32561a823 0x7c9e7b25c7674cfbbc989a0991c9b1b61eb262d7 0x530702661485100841aabbd4da6b0194b1d4e591 0xcd928155797b1749efdc978ba5d96046679b2328 0x8145da990f21b4ece468230e8249cd7ea7756340 0x9d4adaf3f44347f9f27be78050b00f6e56d61631 0x4802a06b9844813cdcced4366a0269ee49b00e72 0x2664db39f69278004588e49a2a85a45290a24c3e 0x7b97a38a9138cd8ede47da3e8ec84a31d8548b34 0x42498fb605201078867125e1782701bd20abe207 0xafde06f7e294a9edefb087576a106b860e9bc5f5 0xacba97c5102e24ab20f38424b430b498dd1d010c 0x2f55f23aed54d4eebcc0823d0883d537e02c87bc