ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4F84D0667EB7
|
Infrastructure Scan
ADDRESS: 0xe94fde83a9e48cc3f81f0797deed030c448864cb
DEPLOYED: 2026-04-29 09:41:47
LAST_TX: 2026-05-01 00:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B52F32AE. [NET] Connection established. Peer count: 45. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xbb47020d in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 4.86 ETH. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x16601c9e9b572558220de85930d1683486afd200df8d1749921f1f9c6b1d2891. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x58a191850eb2ff7a767c7411ec3be1f5dbed0d55 0x6f1d0eebc3a2360ab83e2927bac7a8c84bb83a0a 0xb614915c457bd40ef73604949f182a3cc23fd522 0xbdc29d870a3eec1f1131d38d626509e39d837adb 0xbe659a42d29f30ba81f213f5eba460efdd089bda 0x2f330d53fd157e2fc4d2722d1d7aff95972c0bbd 0x472c4ba957852493e5e42dea60f0b5b82e0766bb 0x7792880f326b5599e7ca3911603626df1caf2149 0x32ad21cfb2fa4b016d617f41ee718b52dbe29ff7 0xf9320671ecd645dabd6af6b7a41f4ba24205ae9d 0xc4abc2238abb473e9d562914a01ce795a22fb4ed 0x849774a7bc867b6846b074b45bd1c2585672ea1d 0xc5570042ec358340919860842f2ee9cf1466181b 0x7aa917d1801cfeff8be2ae80ab36cd00d07826b4 0xa844a1ee0a78010fe58aa4e80770f8cf3f3d848c 0x8eb268069d767298c51f49a28c3639fb156c7d8c 0x8a433bc26d6f3b3e17e1337032942957f0278fc8 0xe94fde83a9e48cc3f81f0797deed030c448864cb 0x07b00d861494e8e4531be40492a29b5594d70d80 0xd059d47a5663ac796cc1f7d000c01501e6ca1951