ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BE2F55512971
|
Infrastructure Scan
ADDRESS: 0xc7ec724397ab85fb858e3f41287bf95da5c222b0
DEPLOYED: 2026-05-16 13:29:35
LAST_TX: 2026-05-16 15:46:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 34. [FETCH] Hex dump completed. Entropy: 8.65 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 25 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xec5266c9e44631e1ba22fd6377c38130c1f3b738 0x7074a3749a10d1acc3d400c5ae026ced83a154b5 0x8d19c237750aa1bf5393cb32675494a794837197 0x0217ec60015bfccf2b9ddb314d7ecf7e81cd0b60 0x51fa73c1ff39c8d9d5bf65f2d57858bb12c228e8 0xabb7c9604d37d973484b6d86cb0153194417370a 0x1d1bfa21f5f5de94657eec5410adebd2271f0735 0x88bae3da85a47402fbf6c5bf1bfe59c84cd57c56 0x3e3eecf79a3a5b9a02b00b230194ffbb2c5e9bc1 0x6f0f7e571b73799046cc16437c596ee594a0ee27 0xc3631c8a55c4fe8b5effc8ae7f12d8f6e201992d 0x1eba9d16858bd5e6d8e1bb2876740032f093c344 0x2249fa422f6ec0538b3118dd824269e065721792 0x500a1893ced662ef32992c8c40cb748837b3878c 0x108925825bcc84ac1d2b04163eb3d1463bbf04c3 0x0b01be9d24cc8dd0b70d82d3e8bb743ffaf98562 0x3b6713f05190e167eae5c89993e14b9623066b4d 0xf91dea1928440a814a4e813ddf4a9d964a3b3dcd 0xb80598d6cab8f104f312647d2e98ad1249ac08b1 0xf3513d66561a6c6692a6d8d974cb29b332c0349d
