ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4AEED1AD7D5B
|
Infrastructure Scan
ADDRESS: 0x195d262573556fc58e6f69e580271bfa84b1f5a1
DEPLOYED: 2026-04-20 16:04:23
LAST_TX: 2026-04-26 13:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xdb11. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0xac. [TRACE] Stack trace saved to /logs/TRD-32593653.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: cb1e5c3fbaafe3445cfecbbb0690899a87854ac7168044343d4202c973afd65f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1b8cafdde1d0790e466c5950abf6515f6b36934e 0x7834d6f618e3b12ced8c9a6f3fd53478161df98d 0xb066753f47d9cee6da204e6f8622b0536521e5a8 0x8cd0a2d2be883652aad8d3af30877cf9b52e1f5c 0xfb10a558a8c4400390321cfc041da8413cc92056 0x79d83b34745d0c68f46454506f4bee570b49c765 0xf9fb0c4652a64c444eb19748935670f18560051a 0x4bfd9a497b74564364a38bb8a837d7e2238af0b5 0xb6a1d76e41b071014855a2fe2973644591b08c25 0xacdd6fe6ed9e02c302f915d20ce9b976edef7f06 0x6cce8c9c1d0d4ca01876e3112f23ffe427a96fdb 0x90df8ea6eec220e4f66ef64e7b21adbd0bb65630 0x12aef6605e8dc459a4da0b9f6c60c195c715ec05 0x8a90f488726a8ed6ac2c68c854896da9d587837c 0x361d760a6d68f7626120555b558741134853fbec 0x4e599012b09d7608d6f24c58cb0c0f5d0a0adb62 0x30d7e5df51f821cbbc69da8ab3a985e1bb70c708 0x9cfc7ad7121d905f5dc5cf14dd33b4c55c3809ec 0x33f1e44db47400c9bd6221962712d882adb8ffa6 0x664113c1862619a6e8fa3ebdf574adbc24779fb8
![]()
