ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3B642F38CC9D
Infrastructure Scan ADDRESS: 0x0654750a6012bd42e06a0f1141153dc8c60f7fb1 DEPLOYED: 2026-05-12 06:43:59 LAST_TX: 2026-05-12 07:05:35 |
Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 54. [FETCH] Received 71 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x8356ba09 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 96338 units. Result: SUCCESS. [TRACE] Call sequence: a8b9 -> 4670 -> f403. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’15e4272e2a6593107e32bcbe4ac76f1c41cb6432770849352f99e1cc356394fc’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8cd3e215792543ce941390440881e0ceb58798b3 0x1f3fba227ef1a3b5be1cb008c1277bf15b854c88 0xd000c4510dca38f8115b1658598cc84f810ccafc 0x6d70dc58f5bcb3019bcded37ba2c6926818ca173 0x3107d783eefc72bcc7b64790626fbb199cb33a9f 0xcaa498f6bb62a4a286f7593602157ba255442a28 0xdd92ee1ada4a6810666fedb68005ff9de204d33f 0x218c241f0d25239fddb39bf6f37192375b20ce7d 0x46423f6f40acbd35da150f52b08ed7132a5168df 0xde8b3baf5d16acdce00d2dc4bbee8063bb4a6650 0xc04d22db28f2bbff3c59927e0ca0f8812c1d0660 0x3d85d8e7a48126a2ad997894756a4005f35dfa86 0x9ed7580f54207266972c1562813243a7df575765 0xb6a8c86da93bc50cb776e9692c5196de6fa05e45 0xf2f39f02281942d8b786eca9b1a1f7623c7f8d22 0xf2556955019415338dc683d8af75107e469a0a6e 0x71bed94fe57ed63b41cac060cd3a82048152d071 0x6d02757a81235efbd70ae3a354240ca2ccd67446 0x1d29f31e8ae118cf52c2d551e79f558457acfa13 0x012e1363787f993973d06cdfe6c1ce5fc8c66fa2