ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F80C50FF5ED6
|
Infrastructure Scan
ADDRESS: 0x3e06794027094fd17e569f7e693463c765bb9469
DEPLOYED: 2026-05-09 00:34:23
LAST_TX: 2026-05-09 01:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 13585748. [NET] Connection established. Peer count: 21. [FETCH] Bytecode size: 5050 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xe572b1c56c5aed34eddf756ad21c7615e37d13ef. [TRACE] Debug: 83d13054f1d5df5b. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd3e46c3807911dd3b1990ae626b8fb92daada3f5 0x84784427302346bce30ebd37f8058755e4380386 0x273ff7d8d3b1ef342a6bb805501af8e41845e62a 0xf0261129422417e93279813f2741ac5a5825a06f 0xb79cc5645056762890f47b477f34690b93d57416 0x19f1595c37a4540998c38611c28e8c91609ea6d7 0x7c873a020ebd3d798884f1bcfd12cd1af1dd3a33 0x29f4bd7abec327363d3a64225b831cbe9196d176 0xd35e56c06320b1ed549a8f85d316fec854ff4b71 0xc25e579d2a8154cbdfdf75a27ce01dca327df80c 0x250839dfa9e01f7982af60f1bf6235ae84187007 0x347166ca04bb2664238c0be50eb769d596efb144 0xdf6a56b1d1082d33e3a07d042298add2902d85d3 0x36aea9021e31750ac35797559b29cc66f444032c 0xd7724d9da5c79d1b4068a8d8cc3aebb5b6715f67 0x8fac93956e398315abed9c604c3e80d358df6b59 0xb1c6f90225fb3b3027959f4893788e48eb819136 0x2c9d272b6d3ed2bbbe9d329b25b2534b9262ff34 0xe1f56d6a76f89fa0b22e53a2020f9d0272fe4187 0xd175c479b1cedc31283f2bfed45bd7a33b336153