ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-680B84305246
|
Infrastructure Scan
ADDRESS: 0x9ed578831ddf3246731ef74e992163631cd010b0
DEPLOYED: 2026-05-07 16:58:11
LAST_TX: 2026-05-07 21:05:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xa4ec. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0xe5. [TRACE] Call sequence: 7623 -> c541 -> cdb6. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf5c6366ba99e07f78f3d2df0b6bb029609216ce8 0xe6d485f36a8c124691e6c499876fedbd8f93fb37 0xb57702c8c914b2cb591c3782ad43667b8f18d742 0x0a5466d5682586ad0bc9a19d470acd8013280171 0x5ecdf65f8280238e1795168ef0fa66ce93bcc79f 0x511340fe2a4dbbd568f27245ba81e09b3258ad31 0x169920faa8a6b8c834ff9735d4e8db72e49bc913 0x90ec5b8a21349751d0c2654b5f1fbedfd6342d8c 0xb0f7cbd5d91f4ec7a4f3eb680cc944a46d1726a7 0x04cee17d30c731bfe0224b843e0bab2d5f343464 0xe9d2640596da632fa89d7618cff351dd1c144ea3 0x4b83c33c7639f6212ba5810aae8bc18cd3aad835 0xf4842825db4ae6b5649a16730856389346ac2085 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622 0x2958270abe870d5d686ab2471d0eeccff73a17db 0xc27ccb8996476fb9146ba8ba15d6d24202a7335b 0xae57abb87efdc1e6f6e0a05f1126272dbe2f2fed 0xa1436366720025e5104f80fd6a456c7aabb45911 0x90605b162727563b3b585c26c79b039f8dfced05 0x1c5d33bf28861caeaf9141b17e1eecc8a99edb28
Đóng góp ý kiến