ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C2F83089BBB0
|
Infrastructure Scan
ADDRESS: 0x78498283452e4a0db6282c2ef34e6dedf0081d14
DEPLOYED: 2026-04-24 09:41:59
LAST_TX: 2026-04-28 01:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 49. [FETCH] Entry point found at offset 0x81b4. [SCAN] Identifying function signatures (0x2daa8352). [MEM] Virtual memory mapped: 0x0000 -> 0xfacd. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 7.26 ETH. [TRACE] Bytecode segment 0x6b analysed. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b8bcd161e162913f413e60dee0a356e5d5eee0f 0x2e28c32ce6248694e7e040e4114ee4d5f0b96ea1 0xfcfdf284d53df893e825d24be86729de02e0e9ed 0x140fc19be930f70f4d5c2c0038ca274ff224ff81 0x7e62941f614e93165e0435532698d4ef535c67c2 0xa2fc470937011c2741e79ec889067f1ef3048f65 0x3ae5e041747eb13499a2fa175373c668ab595c93 0x50f21e2e2abd824956c8afbbcf26ebbb5543ed6d 0x76405c21f875f9328cca9e87316a22388c6bb3c1 0x930b04461de9974fda395e9f9be9281b31c48ce7 0xe9506efbe5f1cc3b52c830e8c229a54c227e613a 0x0270dec803fe2bb24492063a8fd1dff4435c7ad4 0x3b5824e3aba0e4054a8ef73b76f6dfacccc24f28 0x80e269e3ab12ee955e220eea33a63f4c13533a3d 0x357d1d1629f21a13decdb1b306117d40299288ec 0x314dfb5d395bdaab3b1312d1599b8c30b5d4dae6 0xd1f0d1a973c6c4164d1561c2a75de66628b8106f 0x4cd115eb8bfa5549dc349e9ba98db7f89b88d5d9 0x4503c028cf2932ec3e0b3f2bc34a2a16db4c66fe 0x42bf5738c9728ed975106a3c8d04336427b92c42