ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7C5146DEDDE1
|
Infrastructure Scan
ADDRESS: 0x180837a68bbe6afc17511d03970479504faf05bb
DEPLOYED: 2026-05-01 10:55:11
LAST_TX: 2026-05-02 21:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.80. [MEM] Virtual memory mapped: 0x0000 -> 0xc9e4. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Return data: 0xf1fa161a… [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 142a7ecb91f65e1ffb6ade07b9652fb1c46c6be6dd916c6821d981fe6a5d6392.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x85f115f459ad687a6e7f214800418c30894f300a 0x3fc47f2d5ca797ec80e8b1589c01ffc67139e522 0x1e68727ef0f72405349d7584749fb6b122ec89fd 0x504631a23065959cf10db79b3d4c384037149631 0x3bb28d31728e6842b56dfab08a23b6b60ad21a5e 0x3ed577e24b6e6b06420810161ff5a97ff6acd5f8 0x8efe5e7680dd83b1cfb17c676f23d47b1f217b96 0xa47a7fd2cc2250a979a53d16ec3d5e0a264e5786 0x8eee4b9efb13447b68f19926e48862d635a426a7 0x2da0a0666bf3d9d354bf6addaacb80b0732c770f 0xca4096e7c63a596dfb92dbb3eb9b09e1e71a3271 0xa111c141de4a5a5cca5c9074f2dabca4a5cbefec 0xdb7e4f113491470875355728011f5b81398f6573 0xc2a86b21d0bc2bc6d3d558513a45fed1b3bf3513 0x96ea26ce8297259e47cecbc43e49e2daccc9ea0e 0x437d72de747528a38b6343d5abbaab6284259a6c 0x047152d76d840f0b91875ea2a88584720e3e1773 0x07978693c01f70373e89d196dfcfca18a6c02d6c 0x2e1f9f5a4306f0cbb904abab4376b842c8ee8656 0xca2a3e36fa2d62ce91f0d635551eadbd9fb506bc