ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E71CB1F0EC0F
|
Infrastructure Scan
ADDRESS: 0x68b9a2759724f174ed6142e90a78d6f1fb8623b3
DEPLOYED: 2026-05-01 15:27:11
LAST_TX: 2026-05-01 15:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x74ef. [SCAN] Identifying function signatures (0xc94623db). [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 69582 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc31dc14a59a708841c3f32b48968ee18483252d 0xcd7dfb565da97a96f0940bc7cdc85527ee57d369 0xa0030b0f16bd4a33cf55363255ecc2cc7905479d 0x9a856928f1eb38805dbf420da496fc381f7ebe86 0x8da27f642d47f519b77e7b98705729be43e5732d 0x0c0ff9d4c17fcb64ccb8c169465b9f7e0b6b8107 0xbbef25777fb37293f72112ff7f467d45ff3b6962 0x87c09cec3c3ddd5bd6f79e819a4fd905c2da34d8 0x9ccd58cdfed369a2f439430f8875306b2ae1ab6e 0xed450420f906e2e9f3faef4351d2e8b3876d2e90 0x0e67f4c6e148e79b84a16579009c3bc0d8579a34 0x2f0a2cbf127795a280303256ec7e179e8d5c4dc9 0x594b4534652deac2eb231ef79ae5df37364c9009 0x11b516423dc2dc129e4edefb02a191a6d06f6be7 0x18c66b8fc3c62d38d5e1037374fe7dd886f3f723 0x255da6425bbdfe93eb194d34f6f8047dedb1d9ae 0x4339ffbf8c80634aaef979abaa7efc172dc6c8bb 0x55cb0741d928bce62c7f70a1b85c4532b0cc1723 0x27e3bac4cc576b05a9a09b6abf530961c06ed4b8 0x4f52cfd6d2079c4f9f43302f625602d48b458de7