ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-35C72FF70E49
|
Infrastructure Scan
ADDRESS: 0xe64baa828d3214380f15612dce35bf08b6eb07cb
DEPLOYED: 2026-05-12 15:23:11
LAST_TX: 2026-05-12 16:07:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 43ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xea7c. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 8635… [TRACE] Bytecode segment 0xc6 analysed. [VALID] Finalizing audit report for 0xe64baa828d3214380f15612dce35bf08b6eb07cb. [DONE] Log signature: c3d821683852e679ccbb2673c4a1fb1efee50f8a2ce7124fa7f3e3e908f496ce.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xce3582d527eeb5275ef22c71e24cacbf7ec90a18 0xab6a6c0fb8e0e1365338033036bf18fe8a0847b6 0x5193dbd5ff6a0514ecca8710add71e4ab32be315 0xa3d1ed3c1bde65c404df51b423f3fc9ce54557f1 0x6419e082c0d31b779a459dc0298fe663fc0450b6 0x460dfdcaf4b1345c9d78049ec7c2041a43d8d050 0x5180c48c8dd572c099b9f905940d2cbf95477910 0xdcc07e8eb8e9146002bf2502b628e9a441d684bf 0xa6acc998835a924b0ebf6d65dff54714416638a9 0xc3e087ce4a35e4a183ed52f4d941269364aa4328 0x22cc6a003dae8645a82eb59f22db65b75cee0725 0x21e76b9903ef381077f0ca4f381bdce8a74dfd22 0x654c663f2d4992ddd94da6f399c461304fb18755 0xa7eea874a1a3e19180aad44912718c35fc0eb5cb 0xeceb795655ba8203c8e082c4b33b732da6ee83d3 0x1668ae612205142faa728393bb30e91cf8032748 0x77092a89840c1e59d65b54fff690466005ed54f6 0xfd5b036b88231a2352ce3d22fef77fa9714abc6c 0xec631ee8005bd7e70686fddfd8b1dafeadbfa236 0xe09d3d770057c5e6a1082daa892d6462f8637ed3