ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BDA74606949
|
Infrastructure Scan
ADDRESS: 0x467cc4f584782623529a8ecaa88bedd81f180edc
DEPLOYED: 2026-05-16 04:49:23
LAST_TX: 2026-05-16 11:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 83. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.22ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x92 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x99435cfcf24f185789325bad6cd3e1cd7a692fd5 0x02560e23d3d24033b1c51d4c5330699632160a32 0xde1eecaf80296dc23fa767acf58a0bcaf1a24083 0x4c8d0538dd418a1acabe10e76d67fab96eb4f6b5 0x984b0cf5ddc4cebc7e7766381428de2f75a00d17 0xa293eb5d0b59f5b14c78e7896aef7e55325ed88d 0x2feaa47c546930fa54b4460365a6763bbc7f626c 0x33f2cbcdb1876862772d5424a6ee825ce3974984 0x3c3d63ea7bd6aae25221d969c9a0b25ababe6472 0x874a188c48a25277038f22b79beab516190cc43b 0x2bd7d9e64fc136f13203dd7070fd2d5a90d693fe 0xf2ccacdbe3075399fbdbe1a9afd10364a4268fb0 0xf3c0b522cbfcf62cd74e494cc8350dddc69eb4e8 0x45ebabf94ddc679e5151bc0e4aa861322a29fb79 0x04cd9126d7ea70b07b5e8013ea517f6753b600c3 0xa15c7c86b7171a14b4e0a3dc22f7db7d9dc2fbc8 0x4d3f8397a7137a25e8eedda229d87ee613a7d87c 0xf4671c1581ba6cd73fde077f3e13413cf8508eba 0x430366fd0ef31cda02dd864788372995d46102e2 0x388aaf1ce348c49e4c50b626c55a19a68e27f42e