ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-137152E5923B
|
Infrastructure Scan
ADDRESS: 0xc47db8087979d55588d9b8e192e477a2042776d1
DEPLOYED: 2026-05-16 16:02:47
LAST_TX: 2026-05-17 05:40:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 46 segments of contract data. [SCAN] Analyzing visibility: 4 public, 7 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 4.64 ETH. [TRACE] Stack trace saved to /logs/TRD-CF6F4C23.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 0fee321be635e7b895251b925fe015e64e3895b46a77fca311870c574985353e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x792576cf10c47e2da5eab1a71f411fab0fdf5fb0 0xc44965015ee5b306092e81024dc2cc628ac09f2e 0x1771d28bdf5285ab236127261397d58dc38a8865 0x2b9aaa03a44c535153a2bd13b00fd260ae12c221 0x5b4ef682225dc83a372d6810234eaa1a962b1715 0x6630fe5242f4aacb73125836c2d3e8d68c0d80fe 0xe517129e3aa7d1d75817da1f24d50925213da05c 0x3a283847ba2ca5119e74650090a5c46b91639487 0xcf4bc4ac10830ffbe0000e0874ade2e50d048752 0xe68d8bf846734ce9b439a5be559342400b9cc972 0x6290fc43af353d5d7b1767790ba69d7e24960383 0x3e8cad25e09a829801d5e807867ed80777826449 0xa3903f8ddba9907256c7dbbca88ad5e6bb450dce 0xcb38f16ab9d14e8965a3ffa18c1d7eaeac2f6b12 0x1699a66119ff5a6c894a1bfc9cbb6b27432c2d17 0x5cd0670a438dbac2bdbdda4d64edd3bb9baff7f4 0x3b0d8b704a92eac85d6c0a401cf0711c58e38354 0xc9f49a959198d3291badb0bb92d5fe3defb87e6c 0xb134ef0401afb5390b149e03526f2f3202befa64 0xbf1853c62540e909aac57c07e932dce67028e25b

