ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-802392B3697A
|
Infrastructure Scan
ADDRESS: 0x615771e3510a5898b38ab46da2f5b4ef67a2f077
DEPLOYED: 2026-05-10 18:17:59
LAST_TX: 2026-05-11 15:26:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 75 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xca147db66bb31c5a6f99ca6798bf3a9e39973a7a 0x7add6148a2184fd002baba51479ee7f7f4fe5425 0x0b3421191abf4930c93fa3b7cccc1b049bee296d 0xc5a672eec8e8e5ed964c12c1dfec10f1b61274ed 0xc5f8b5ff2e6299d22dac3c09d597785aaa3caa6c 0xfb53f37c03fd7b8255fe61cf848460d619231ec8 0x3b50629910e104beb3e2995b4fcd6b095fcd0bc1 0x3ee6a40b0ee1dbb329f97925feb2cf53e7787344 0x457f03106ca8f122f5f174c9299dc509db9ad305 0xadf17a2e6bae6325693f2e8bb113baef15036c04 0x57c09dc087ebbf41d2af3405ce865804619ab457 0x8ef69dc97e517f2916b728a2be7b9153f70a8f1f 0x460e1d158baee83ea78cd48f06caefa0d1ca006b 0xfb2818285b0720d00dca1f4c19cb8ac970d148c1 0x0cc1ae1980098b5e4b9e573d6e0d02812a4681b6 0x80d06dc6c2e50746257c72b90b0264266bc8d879 0x99b3345d7f4501d06bdfefbda4fd9b594595a562 0x1eda7c64527656a2ac526ace890929fdcc5af6df 0xdf05b55fb4769d3b6b10a6a5e16cb63b2b01aba7 0x83b8a8dc9524e1b9cc37a723e0efc8a425d13c26
