ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-38C411B24FDE
|
Infrastructure Scan
ADDRESS: 0x0fe3fee27e22fba10abfdbf54a09a53a79fb4b86
DEPLOYED: 2026-05-01 06:12:47
LAST_TX: 2026-05-01 08:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x3ef9e2f7 successful. [FETCH] Entry point found at offset 0xd3a1. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xf9c34634 in memory heap. [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Mocking MSG.SENDER as 0x31dbb27f5a7f3db46a18ede6ac7041569ee05e58. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 05f833fe…32abc9a1.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbab52d8e7492cd88f01b4d30b1998e113bedf883 0x4503c028cf2932ec3e0b3f2bc34a2a16db4c66fe 0x8b8840d406d0bcfae227d7903db52673b789cfcb 0x3b32dd6b9eda81ec8cd32d59947e4079cd3c1d2f 0xa21e2618af310667fbaad36449db72aa3a667bb4 0xabd0711b009395c08844c31fc29a0e28d7706afb 0xc2f4383cc017a1b29e0ddba48ec5a7b77e7165bc 0xbe42e46eed9838b7ddaa15561521e5eede0fea1d 0x8cfa5b6d31d1e42569eb7b2fcda8e258c6a72d7b 0x788a46ac490da1770ce66054a5d53452a3c53bf8 0xc72899f5b7772e2042a9ed92e36dea76d2a725ec 0xb3fb3ad3406503893457620fd8a2143237957eb5 0x8113948bb225bcc0f093ba0c2b2bcf37494c42f7 0x26e1a32334c00d37664e1e5c466908c934960f2b 0xcf5971dd67fab8ecee889d412847fc9988bac31d 0x8943b340981fca1c79c3fafd4da72721cdf43f7a 0xc3848cd5bb4c507f65be6ca6b4ddac721be11d74 0x8d09984ef52d32594f7b7a073ec019d24a2a67e9 0x28c786b863ff231ad28e3aabbc5e2a878c7ed0c6 0x0777221a9d58b72f8f4c7fed0af3a22354aa3032
