ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-193FADCA085E
|
Infrastructure Scan
ADDRESS: 0xc49cec957f6c8363dd47233048547ca3867df789
DEPLOYED: 2026-05-07 16:45:59
LAST_TX: 2026-05-07 16:58:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 69 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x66a3d5f309d7dcfc51f378db8e86f74765157e10. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: ef06fa03…515ed0ca.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe43f3b1824b477a125556d6a318e02241df28020 0xa1d771a9874d3396a15bcf67421ab3b52df8b630 0x8a5452bc886aebf1e28ad27588e6811505b91e3d 0x2215fa3d42268ef701dd90707116c5e7282c82d0 0xbadeb510477d2dbd589570ea591546d372f810b2 0xed2b99640cf58969937a80e853bfaf8020d3198d 0x0467c57cadfc256e6a93abd5401baf26bdd382ef 0xb1c683590a1f401efdf9ed8aff5e3b530c765fd9 0x8a7000a1f3c8d5b2e151ed63badd80d356559347 0x8d5ebe8962ad7c0cdd84aa7a16874df8d21f4845 0x87b723960c170561e6b7cb74188b5f159e272c74 0x18905dc04cb800f300dd91d4370e7b3a38fe7642 0x2dd2f94b9b70e31d76f5acf80bf5a87234a30bda 0xdfe93d4823cccfdf601d98818cd67e25b731e227 0x544a849a4aac0ef2501a2d31094f3117b9beb0f8 0x0ee345e92f06f9856cfee9be21559e1c7a33427e 0x3437ace1c741586fab2c0773f13684e9005f43d4 0x9388bd2595e8504a54b1bba6d283365bde87b812 0xf95a53bb7b82bb76d7cbd74f86818baf106abf87 0xf653a6da634d7c4d493c74248d40f807b1d7f54e
