ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C87A20C331A0
|
Infrastructure Scan
ADDRESS: 0xf2556955019415338dc683d8af75107e469a0a6e
DEPLOYED: 2026-05-10 22:32:59
LAST_TX: 2026-05-10 23:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x97fc. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x0302fcd9c6b9a1d4c97a2b050da4dfd805274545. [TRACE] Execution path: 36% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0a791788c28adab86c75af124a9a08973d33515f 0x97205fba8e17e32c135aea0b0905b3a340996741 0x2a82f8dccdc013b5cc33d9291ec27d5aeb110e35 0x15da23a16f30de6d9d096513feafeeb1d24d3853 0x7663f7e1495d8c2894438c695f60327bf9f55697 0xcf9c0d71d51c2b6813859e380fb87cbd2e760f61 0x2bf51b62f40eb02c9b6a8ce3803f5208af983102 0xa6cd2c2ecd4e8aab153b6b949a8de79c7fb5631b 0xae8066e3a16c171d745b2b87be10c499bb894289 0x99f14b23adea4f675ac5b0f5751c650605e0ec09 0x5f1eda21fd6a514f7ec598107c73445b13c1f365 0x76804ab9114207a43dd61ff1bcf79d1934efce20 0x4a5b61335c48244b7df87e12f841703c145127f4 0xad3265858c26b57fe23cc766725e5950a57916cb 0x332ad8e0f50ead0c8a80913b81065255c39fbec3 0x05a132a8ee07d02c0383d564e6513f4701b044d3 0xf0f41a33667684f34fee84b49e604326d9fb7976 0xbd47423a670d020cbaf425341dc0381b83478bb6 0x2da494359063d9383aa8626fc087ddb9019d7696 0xfeacbe88793a44d61ec12d17f14a83f42dad0669