ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-301EC70C5E7D
|
Infrastructure Scan
ADDRESS: 0xd7d374078e2ecb82ae58111c73ffbb77c1b02968
DEPLOYED: 2026-05-14 01:05:23
LAST_TX: 2026-05-14 03:31:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x91a6. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 92 iterations. [TRACE] Stack trace saved to /logs/TRD-60E22F54.log. [VALID] Signature verification: 0x590bd8da3f21d343205cd4596d3198967b9b2a94336e4acf858557e97b788057. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x22d6cb86a0b3ce004a3852de8085d90b8f35f7c1 0x0ceb89b27db3107c7d8dbdb7fe7e4f3008a61124 0x2723b8bb6e199b5f7df427b248d7ca7ca56a4baa 0x5b26739627968a715f9fdcfbcfe13d7f24bfb1af 0xf74cf56fc2c885dddd853428852debb73f6865a0 0xb481d8a0836530a6ed93cd27bb8ef6415d7bebee 0xe9fbc38338e1a27ebac009e6b3e4d8fa862f7d3a 0x168c1585670f8b0bf940f66fb36bb68619242c14 0xf90532bf178f5b336e7e0014230365dbc2466f0c 0x013c24280dd6fb9b7dc2b810eec8702ba25e7214 0x503f05fa827590658ed813c0a4f14ae3a765f400 0x8ce9c20a8c706dbc3e4c8f796e60d217e32a18d3 0x745da60d2d5c2cd6026a4d08c769ab3aa646f932 0xceb75b8d8f4c4a3337bb95a34273442f268f5d92 0xf0033cf07d56aab220fe31d0ba9c14280e5bfd92 0xac19e3b73c8cd76901f5d0f69cb96a2540c82226 0x94891558f19993d12bb6dc032cb1fc3f33b75cb6 0x8411b9b6a8aa0b5f9779102c15d8f59cb647705a 0xc561b629fcee218ea08530b813cc77cac3903adc 0xae7ba272b0a5fba7c16d9c4ac126c8d789b25faa