ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49371F3B1A10
|
Infrastructure Scan
ADDRESS: 0xbd09fee03d57f9c2706291e07d64e9f3c823a7b9
DEPLOYED: 2026-05-07 17:44:11
LAST_TX: 2026-05-07 18:20:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): a587ada7…5f9d759d… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x5ccf3fbba9facef12ab76689cbed7e88600650c0. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Scan task A7756663 finished in 88s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb05fb427caf044c456cce381a62851c31a06d11 0x215760d6309d35006ce06b4d59acc8ee6d5d1bd7 0xd935877a369f21983f4369ef40b3bd93904030b0 0x6c95a81065eadf727166ccf7eb5f96a03feef25f 0xee0505bc4eca8ce7a48aa4c7037bc11555881644 0x23fc43e8ed464dec568e495a9b235589d802a985 0x0acdb8afbd14cf07d20bf0408c952f0be4d6aae0 0xefb0756aebb14653407a8a3f7fd69d3d44533c13 0x9ca84f72421f816c5c16c59810401ef9e7b96f83 0xde8cc7db954426d2f2add05933ec83b2f400cf0e 0x62a2b8e80fb8d4f98af400101682fdab0620a15d 0x28828f622fe70565a693c3537f94a687d4b466e8 0xa0614c9e9d0bcf2bb9ff9bb65773106758309783 0x517cb799fc5fda46600416e5af7c9cda72c95fa9 0xf2f73cc7aca1a2614edc8b5cf7037d6878322e8a 0x9a56c59453a2fbae01ba46045441490e5c7a664d 0x985ddc7f1b9c08dcdf9d13a19ecb6f1df6e5e26e 0x381e15ba7d19c0d08dff5903d36514a456479060 0x5709242013744e5f2e1bd62aaf6c9fee521c0961 0xacde33676ae3c092a44d63025a09a80bac0aced0
