ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3FB5455454CE
|
Infrastructure Scan
ADDRESS: 0x7d89cde2e38f514ae72ec89f7f336c696d35a512
DEPLOYED: 2026-04-30 12:41:35
LAST_TX: 2026-05-02 04:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x81ee. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xb68b. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x11. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef7faf6d76a8f94621d81dfa700d3bc60ff5b1cd 0x411c794c65b3fccfb6f32e2f9daead960e297507 0x49aed03293770b7f4820a423a6d2a1c5f14588f4 0x7565f8f24a6f8f272f1e0556309f096982a8dd83 0x9f1f59542737e1fc945f7c515f733259b67f06c0 0x16b372c905a06874ec30ece75a97f65ab4d47cef 0xa46ef12681bad78192e9bf1694ac45dd10ab2f00 0x12ec603e51a3a9145b7ceba8df90fbd41ecd0acd 0x4d8d831e980552a138f5ec9c54e0c9046672ee94 0xb0e56ff0ef158ae0b3472b22bfc5f1a76c431528 0xb1f0fc4c5d92b628fcf4bc39d23f8478774906b0 0x31191e7a97268a2b7532a7e1f6114f3f5dfd665d 0x262bb364e7c8d457beb0e6063b5a864b3c05d76e 0x572ccdf46949051d6661c8d68507edf5432a12eb 0xcff0f3ea3a7abae2bc535acff2b6c07d9d66b24d 0x953811a69eb8486dd8d1144b71ac84093a6e857c 0x7a8c29919080222e02ad5e63449c78181db7a8ef 0xe8e429c40f76ea2b67179ea36be0204623533ca7 0x48c6ad5f829d4c7d535ec0c0d0103d21a96c46d3 0x4885f6571c7545d75debae97c659b682612e0170