ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6AAD57218741
|
Infrastructure Scan
ADDRESS: 0x890db94d920bbf44862005329d7236cc7067efab
DEPLOYED: 2026-04-28 10:48:59
LAST_TX: 2026-05-01 15:30:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 42. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x6d37. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 9036… [TRACE] Call sequence: 5754 -> 14b2 -> 8606. [VALID] Signature verification: 0x89e6f4cbe4c7873a3a378d4ffacbe020f51ec0248b951b739ae40bb7112397cf. [DONE] Scan task 828F3EF9 finished in 41s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9ae014c782edaab4d9f51b08de678107dcda6514 0x3f01eb516992b5d16122dbce489d5e009966a98c 0x8524533bd814bfc402f8f0d4ea14865d288fa79f 0xa454da99bd26de1a65089e447e295e12c9b426a2 0xa9c9b2031b6f3fc4fb49275305d6ee3aa9b0d61b 0xaacbb08a6fba78109160ab36ad138c7aa8453ec7 0x6e937edea2858c2760b74da605a377078dbd3997 0xe1119663cdda7f8768bdca93a22cc398f9cce888 0x7debbef6d9f5e87a7b0d80b39fd244f6b84782aa 0x99bd684940e7e7701bde0f0bb69c39c8c26b3dfd 0x3e26d0645ed54f7da1c55f8c1ec8e864c0c15f26 0x79ef714a599aa22e9dec762aeb6071929d6c167b 0x092267a86cc4d0fbef351dab5283532ffd8a45ac 0x0af1aaaf23462c888814cdc75b86e449872b5da9 0x224b99b7ff803bf624c3ef3506addf0866483a1b 0x38a3e2212e406d85e8024a8e660d44578dfc4125 0x3e34b5aa54fd679fc54168bc002392cb9ea6239d 0xfcf599843026bb014ff9afce7b3cc3237fab222e 0xff119abb7ca69c23d68f691863592070201cd40f 0x8518fc77008041b08e35fb62d627e349728a3dd8
