ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BC3882EFFA19
|
Infrastructure Scan
ADDRESS: 0x814afd26a67b0c3926635aae5827c6608b79802f
DEPLOYED: 2026-04-29 13:57:35
LAST_TX: 2026-04-29 21:41:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x814afd26a67b0c3926635aae5827c6608b79802f… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.49. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x9b. [TRACE] Bytecode segment 0x80 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xb5eb11ce4399d91a4b5e9120fadf08bd48fac636’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb3cbf1ba693275b2288c9d9813d48cde0a555d3b 0x22f05515497ce8d78f3898088c474403ac9c668f 0xcf361a5d1af9c66407152e54f175d57ef9c35bfb 0x3b468e5a38b3d42434da64c1ba9bb83606309eb3 0xe5cdc31d9dc5f9b5e73b3379784326e9a399218c 0xe328e9b94acdbf68ed01811a7bf88323a0fa2c43 0x7f7e156455e36e375cad0bc3e95e25d18db9c6bf 0x387356399e3e0c713f75d4d42711131f3a0a3211 0xf38be294c68ff29cf6bcb0c4396b8d8366d50149 0xc21a2fd640dc938ea9c02ce4aa845dec30561257 0x02173a3962133a1a49f4a1a056c2afb5e8c99ddd 0x2f030d33c9e7f3c1ac6b6e89eee7b05f449ab2a7 0x0d04c66bc5e27063ec735108b34080d86708fb12 0xfef0ad027db5531b01732bcd83a8902dbe3c9e90 0x16653babccfad0765398e120fc68d061a88d443e 0xd00c522ec448618bb292afae3adb310185210f5c 0xb9cf51af1dd18b89b42c7406daa3c2404a52c3fc 0x84f94a4720cd2dc2c1fa9800182f521539f269a1 0x5aecb995018fadbf06b1120869378f6b49e040d6 0xb7008b9843eb20706c390aaff925ccd4b5a88be5