ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F84C99A43347
|
Infrastructure Scan
ADDRESS: 0x34861aab1cf2abc0a9615061332bd9426a7c7bb4
DEPLOYED: 2026-05-03 15:04:11
LAST_TX: 2026-05-03 15:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x32c367ae successful. [FETCH] Bytecode size: 8007 bytes. [SCAN] Analyzing visibility: 1 public, 2 private methods. [MEM] Garbage collector: 0.56ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 22 iterations. [TRACE] Execution path: 59% coverage. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: b8fc57c8…18a5132b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x53d812d899e5b3e14566487e653f227904c615e1 0x5d74b32882aa2ed2cab81deef043a26791a6d011 0x88a07b070c9af4d2a5a5b30b5594b0282ae2865c 0x768391905a68e4c5e30dd5e173a4c04f5d4e1bc0 0xacf0b0b698e0e54e68fd486e25e49df68b5e1520 0x18f4e11334f96b5e13b565dff6ac061048ccd804 0x218a8a894a47a5030c8181fe5bc12bf37482f81b 0x6cb019d8f549334bacf5a4fdac9215b097f5567f 0xa0a5cfc24589efb44c955d38c54bd8c87e1587a6 0x5c6a1d40af115260a12312584f0e5c5be088eee9 0x64ec79b0f4a6b4e4f94fe3035a552aa6e89254a4 0x51fd501d1d866177e209eaa357c515578df1c766 0x2efb621c2f8422b948e23830a895c163be91e0ec 0xdec5ee459212d512fdb1b9068d782961c3044969 0xefd08136db5e38e9e171eea6b74ffeadd5b24562 0x58c6e3d697228bd367f103ec493ac0579ecd07dc 0x6242824b779a44b9bc974fddebfafd7e92ec1682 0xd5ba79f8ab1a101a945997d7068bfb800d048407 0xfa5272c76954d7d085de21cc418a6d598db0e8e0 0xa2a6892c4e38904be80a58743b62a9e0e67d4e93
