ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EBBE1AD53CC
|
Infrastructure Scan
ADDRESS: 0xa6ba3d702a8bab4acbd79825b72cf6b5440c960a
DEPLOYED: 2026-05-02 05:16:35
LAST_TX: 2026-05-02 05:44:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x77796321 successful. [FETCH] Hex dump completed. Entropy: 4.98 bit/byte. [SCAN] Analyzing visibility: 2 public, 8 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xb3a326d4afce8140e624e7532b6b90f723b7255c. [TRACE] Debug: 1a1154d42985992b. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: 876b012410206f4caf2444cab0481ed4951c5bf07fa965064d8d889407b9af28.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcbd8e19f4d8a60249b1756817c414fc6fad69d5d 0xc4bfb68447bd3a27eaddadd23bfd861127bdd651 0x3b81686d7b1a6fff80de2de29ea00b7b13876aa7 0x4eeea1b539fa9179fc58d30478c172a061600907 0xe781f7d1b33ebdc15c811813b08c96c28c80ca51 0x0846d51f36716d1c004833e3dd2525ec9282abfd 0xa8b7df9fe99886d7a6535e6d9f0be521fc98c921 0xb80c4f6a406bb470873ce0d0a1deabf21fb43d9f 0x761dc4a446482d261b8b14cb2f1b9f78d7f966ae 0xe7d4d3f7e48c52be98219b2276a99deabd270fe9 0x349fa7e2a00fd64855713cf9b11e3c4c0232082c 0xe21dc343f6eec26b140076d4aca547cd05bf12a8 0x67f50c8b82305306ff7870616be44c1de8d478fe 0xff0d1131f6957a08f52d536b28b34dc6a392991f 0x8840afba4057135218c42a26303cf503de213f88 0x2660c0db6f632a6ae3cd900107df1e036ef78681 0xe7dfe204b545704839e3eb109bd6ce91684c17b3 0x55bda6ca31d495777d2c1b3114701bc1ad893e6a 0x455977852da444a1986df7ef07033a52833ec77c 0xadde961f46436504a6d4dc0dc3f00027b603b597



Comments are closed