ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82943F5ED566
|
Infrastructure Scan
ADDRESS: 0xdf9c96aa9a9a705053c27b30e2be7627af59ebf3
DEPLOYED: 2026-05-12 21:34:23
LAST_TX: 2026-05-12 22:15:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xff9b. [SCAN] Detecting compiler version: v0.8.72. [MEM] Virtual memory mapped: 0x0000 -> 0xdc4d. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 21 iterations. [TRACE] Execution path: 70% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Log signature: 9551dc7daad971673b84dc66c67576e95113ab4fdd7c7d52d2348cc5f85ba4e5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x696e7b1d5d11e2cf7f7b970acf54cf1491f17a47 0x4fd943520b508f5f3691b650e1a68c0e754a2e39 0xe44d4e20a578d2a18d2db7aa6222dcc17f753e21 0x2294a496af9056de8a5d63203d468927ae76ab0e 0xef98956b16f61c35999594ceebd023281b8032e3 0xe8cdc66a32dc45cd853a0277120226588b90974c 0x82f8f9b107672915629865b71b7208b7281b55cb 0x0500bd7089606df1c845703815675a8177a2bf8e 0x8d6d097dca15cafa54c2f38ff8437875b7fe3341 0xd1de5f0436cddf084d17ba9cb4032a825bf5ad70 0x894387068e8fb1a5a3deb004c00e6177daf84e06 0x928ae3d3919de02420076bebdc8f23a89f7cb468 0x2a21a27f945b0b758889852b83eef5e1d7dfc190 0xe53467a414359bcfbe5ceaeb12225f3ce6765ea8 0x0c5d12ba89ee3f76f9f23b91b1318153025d728c 0x684869f331d9595d12e9c2a6cfece8565c7fa410 0xef25d56d5c18321b924d526414757eb98f4dadd4 0xfaa041170990bc4e21a761d8b6f76e2d387d14fc 0x7109cefabdb1af1a4174dd4821e8bf92789ca480 0xa0130c2ceddcd48f59ee128469cdacfd42f96c60
