ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E7D763005DF0
|
Infrastructure Scan
ADDRESS: 0xab3fc4ea2c97253dae33a31e95d78b4156e29f7e
DEPLOYED: 2026-04-25 10:50:47
LAST_TX: 2026-04-30 17:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 8528 bytes. [SCAN] Identifying function signatures (0xfb8301de). [MEM] Tracking pointer 0x604abf18 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: 7144b0d027986d2f. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task D3078E53 finished in 28s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4eabf1d3e14241d6578608e4b5dc6be783e8b7ba 0x3466f074f55336fcd6f45fd656b06c30c5dc493e 0xe28dfd0a322c3309d38a032f3349cf0938f799e8 0x2e14465a9e858e00f4302ab60cd7b6c120efbc7b 0x96cd9abcb2a393ea4cda6afab5460b9bf36763d8 0x109f17ab8773e80e9ae9a7eb9cbf5d86e23892ab 0x5134ab59942a259ddf1ebab5900430c1becefa1e 0x279525859e641e91ad134c01920becb950c61c30 0x075cf3d545f56feff43a2c29a186045c9f819487 0x02b2d4c6864813e6aa24ea3db78ec91cb965bfa0 0x5fec807ba7891f565bb060d617a6eb7ca14e3428 0xf0a6d016755d76e41605f94a88bbb10d6e303b63 0x1cb90858545cc1b1cf4b153ac056ba88a128f2eb 0x9b1ee0ca8525cc7cb0d3f1ba69c1ea561b1e81da 0x333f2ce173abb3de8c6c53321b9b33173145b57a 0x69d1352aae37a4af727d5214da9b5b632b3a2b6a 0x75d9ef48e30bcb0b658c1d387233fb52ebf9a4fe 0xe5d503fda1b5a8455215eb87f64dd06b5cc8a4f3 0x80103728df6768d1c4b6c264859db0304ebea331 0x65e43f86f4f83cd4d071b1b7b51b7d36bd26f5b3
Post Views: 2

