ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-70C2EAE8B205
|
Infrastructure Scan
ADDRESS: 0x4c8f3c90d5989f313037e0c628bd51e99495b76b
DEPLOYED: 2026-04-30 06:18:11
LAST_TX: 2026-04-30 13:36:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 7379 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x445d113d4cd1b5c4534a0a6b7d08005461ec962e. [TRACE] Return data: 0xcb97b188… [VALID] Consensus reached on node cluster: 7/10. [DONE] Scan task 0AED4D89 finished in 64s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2ed23cc4bb59d24ae2fcc2ea0d5b8898498e76ab 0x1dbf082de90fd7b258a1f4b42e9135252d87367c 0x76752e33050f2011cacd3edbbb8125ee1e49c140 0x86a3493063d5c35ffa1dc0c6fba1fa59b7ddc748 0x6e156d84f91ea0a5b53a3ab9635cdbfe418cce98 0xc0cdb5aa32fcbf50e04ff743373483109fee05b7 0x3ae93cc5ee07ff81a52e6b26cc3452fda9992495 0xc2aa51bf54e50bf03bcfd4ff15d4cd3a1052cc13 0x632492388f639b5cc82aeb942432587578392fa4 0x25cb0485ab8ffa03d0549a73dc986210a9cbea91 0x161c886a5ef51c4b20f2f4ca2cadb20c93245705 0xdb0046f07aad56fe8ad041960f774df4c22ab1ae 0x34c43849e03091af93535799b19f1ee9552b0456 0x9792ba81d39013504d361434cda09831a75efa7f 0x18f032c720ac6be5e4b6e42c59e831a9cd7eca4c 0x7425b4ddbe70d2c94ed2c4470cb7b6da3000c681 0xda7514ad3b2b3ed739b529b3d0897a18c2dbf80c 0x424aff3b99d2c83008e3d195e1ad33761047524c 0x2d399ed3b304cde030fd31689a59fb8d44660ec2 0x976125365d2f0858d6bf13ef94335775568dd467