ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DCBEDE111ACF
|
Infrastructure Scan
ADDRESS: 0x422b966f89406ddee5dca1de55525a989f814903
DEPLOYED: 2026-05-01 16:57:59
LAST_TX: 2026-05-01 17:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 6963… [TRACE] Call sequence: 3edb -> 36f8 -> f906. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfbfe652fe8be7f87ccd72a556921f8ef3db2e57c 0xd44e7d98c64b95cc45263d45dd206f400e773bfa 0x9185f9c0bdacd13c07c5e22c7df3d9d4bde87784 0x3a9b302d6c85c74208d21c3f4034eb7c17765ef3 0xa173f65906b39036de201996eaf5ff0762ec1153 0xa8ccb12e68423dcf72730ff43c7bd891f5dcdc99 0x7268a30a57ecb3fdd778c3ab2c368357ea2445e1 0x3aa47555f65b0780e6320a07233e2207ec2fe275 0x4fbf7935f5951bd668d394f51d24be93c829d9e7 0x6aa6d3d3b8d5d014d6c0e6acc4ec894f2c5d8a27 0x72a815c51e0be4dfac8e089079fe8f36a9151c04 0x8b287e76a6523d458a831e1a2d359ea2a1bbc42f 0x61d2f2967758467ec08b8b9647a994b4ff6548c4 0xee749194f70f01fb14033e32ae3edcde5a28d46e 0xc9907c891544682dd5ce71a75d2a609e2e6e4bea 0x7d26b43cbfa18da8e4e8727e9b53cf91a0bf3c99 0x8240a468a7eb4b7f85fadf7fa022afc86c059343 0x36318491fafd8a53e500076e57994356ac045eda 0x81d645603fcdd142b1985d7c6b792b3721e8545e 0x5b5b5b41ce63d2dd39a4eac80f21b75ff1b18524

