ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1ACDCD511239
|
Infrastructure Scan
ADDRESS: 0xc5425bf5b110ac9a79b0a93df58e75e190019e7a
DEPLOYED: 2026-04-21 08:03:11
LAST_TX: 2026-04-26 14:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 29ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xca612773). [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xe9a32f07057081f058325aaef587f937ca68a726. [TRACE] Program Counter (PC) synchronized at 2333. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task C01683E4 finished in 19s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3e064f9b04154981bc2159f197bb5d0fb8918f78 0x4074d033224ce96a2d6dace4d0b4d2e4ada2b8f6 0xaab645956780f5c2ace75b098ffabf2d0c3d96cb 0x7bebf017629f36d24d2193437ad14ca7180e0439 0xe0a1cd680f5bf64f41f35ec1722801ab19180673 0xa88054ab5d81774624be571b8e4f3c46e38f7fd3 0x6afacec42606336ea9740e3313d36d38694ff795 0x318071199c68fb8dcf15887b931e8e59b94f9533 0x4f4b3943b3de52abb1df85811ea4540a5c40ea14 0xfd2347b18622db53688aaffa122903997cda4fd6 0x63c3d58697ead248e88f04d639be778e19b67987 0xe46311d68892b7786f79907554aa31d2ba5a149f 0x52ba3cee967340746e9385ce2f6cb2da3811eaf3 0x17e26551fba1ee112fb5aed1bb634317f6fc812e 0x3db5937d2a0b17a234fde3e18d1be5b875689d3d 0x44a2abde8e5edf34020296e1ea9a362fc5d92e6f 0x8bc4122e5b0d184cbfa5f69adab20e79d80e9c20 0x7a7b2992e054a6a45f538df3956b90c053ea9bb2 0x107f06c2ca737535f32dfe2ac2278a02b9a4f3e3 0x6e957842afbcd01ce9db296d173f39134b362771