ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2CDD20BC0312
|
Infrastructure Scan
ADDRESS: 0x351402d93ad6744587c05f641f47426e99ab03a7
DEPLOYED: 2026-04-29 19:47:47
LAST_TX: 2026-05-01 05:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 7.19 bit/byte. [SCAN] Detecting compiler version: v0.8.18. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x67. [TRACE] Stack trace saved to /logs/TRD-63956D91.log. [VALID] Finalizing audit report for 0x351402d93ad6744587c05f641f47426e99ab03a7. [DONE] Report exported to IPFS: 32e7e0ab…d799436d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9aa27a8f84191450c37ce8230533f6e6b68a6f7c 0x0e7fa533ba8a39119bfc91c02b41cde28f922b6c 0xf7caa38777fca07aad2e97366cf958858256a8c4 0x1cf2137eb88516d0e91e89493e8183390fe760a2 0x1ea35d2737424fcb11df0e5eeedf5243cb06b388 0xdd3e47cf0d389a991206df443bfdf1d848481f59 0x5e02b5deb5411a6752ef9e2da3f94f1edcc6df22 0xe841d44c957f14384239b00bcbcdc391e6d46067 0xd1eead55ccf13e143abca8a2a8709cae516ef6ae 0xa235ed90a1f9173b3d9ef10d951e4ecf5b25281d 0x1b36c055778e715246bec976e8c1b156d2e0dde3 0x0e34abbf703ced44ac4024e038d40040343e4f35 0x0187ecf93898b35feb4c1cd331676fcd2924d444 0xb69ff5221e7c4f383c0973f0bcbe2c884ff24dd3 0x64bd655e1ffc70ee51e5f667c621eeaddcfe0ce0 0x3265773562496b6b3b94d259c13e60f974616f3c 0xd7ad3257834bb8149ed4f52c876eb54bad9bd0f9 0x54d0e32d32a4f5e49c79f8a8a0097b284e06718e 0x0b9b44b1c87ef3261cdf6e5f9b29ff94253eada0 0x68b2e9200e78c7845bf0a66030ec9be393bc4b5a