ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4EC2D06035EA
|
Infrastructure Scan
ADDRESS: 0x6f03e1fcdce38c47a28f579cb1b667d810fb7689
DEPLOYED: 2026-05-09 12:57:11
LAST_TX: 2026-05-09 16:47:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
β OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 43. [FETCH] Received 58 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 7/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x84e536b9d8b3ac1e4bbf328d084d65736fbabf36 0x3d06d4339d683421e1bbbf6b57bc1bd441373071 0xc7b2a1fa64bc26d623523bec6c97bda417fad623 0x22c5613dfd313add1ff6b163651aa06358ce1058 0xd20524724b10c354506b20847ed3ce070591c4a6 0xb42dbcc5f999e4a67c31578a4be9521b9e4f97ed 0xe2ac7a8223f327f9d5f0cb21a6462de5de0c74b5 0x9894282c73afadf1c5c63b6fac0169039fc42983 0x4f5139adced4f2a43bad490341b8e3ca8aef23e4 0x02075ca0c485ea398d2321763c677adf5a2cca2f 0xc5752a9f47dd0caf7e23f5dc9c2c5d3d768d49ce 0x33aaca8bd99e125b71ed5ac6eeaecdf8e210360d 0x8daa1b35cc805c418860b87ba39a1e568e7da3af 0xcbfafbb12eee66e0be8a792e426597dc140d56be 0xfd6bee91c268faeecf40d749e33d35c4852bc812 0xd0586a927e9b6af51b5b83e58453c811fa5c243e 0x920f37228d6f91464398f04bf24c750190974287 0xf0a3e83fe91a18f03fdaec106ea5f33271a766a4 0xa54c41ea8d9c47e5f890fcb95c5982aea1fb1215 0xec527a5be133543ee75a273c15ee373d02f2704a