ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B1FB8A15542A
|
Infrastructure Scan
ADDRESS: 0x0098a975cb994c39477217c213e37931624b2f6e
DEPLOYED: 2026-05-16 15:33:23
LAST_TX: 2026-05-17 06:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x92d7. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 45426 units. Result: SUCCESS. [TRACE] Bytecode segment 0x95 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x060800a52723b1881e6d86167ee3a8cbd8b329fd’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa8505b40955d2315480596599783f316f860dba2 0xe080d18de69fa521a6d2a40b843cf83c012c4398 0xc56eb3d03c5d7720daf33a3718affb9bcab03fbc 0xe32d849d1fd31f17bc6798713780865ab5b450b7 0xf1228f32c043074e282f484da47fe172f4919b5a 0x57b5c9383c217ba877f4905acaef4244445b22ab 0xccdce3e3439074d41057de234b9c82e82652e185 0xaa8b8873c6fd0c80a42ee219e9f543ec1aa01742 0x56b78059f22c929851830cff0c4227eb281b9021 0x2722ace38ca2eebe051595cdbc6f28cd13b5af33 0x6587dd1f651b8ff8583919e1e51eba3e43ea5d44 0xa79abefefa55e4110a09fc66893794ab1b095302 0x582572fc3b51ddf5890d754cbc9c7d797edd928f 0xd6b67e19eefe95761885e3fbd35d3c57ad0e397f 0x04e66e492cc14947138608811eeed0b17224f2b6 0xd0e90484deec791e13f598f7430d3447df7fb6a3 0x89037557e311fc95ebd5de835a26436e14f78b16 0xbf235d64bc2c4814d28673ee7aeaf9fd58ec834a 0x6928926840423e391619e558c68fd37fb40c1c6c 0x7ed601dcea01e64fde9801b6ce9eb34fc36dad3a
