ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-283054C9AA0D
|
Infrastructure Scan
ADDRESS: 0x3ae55830bdadb546f7035013f6240d6cd854f168
DEPLOYED: 2026-05-09 15:25:11
LAST_TX: 2026-05-09 16:09:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x3ae55830bdadb546f7035013f6240d6cd854f168… [FETCH] Entry point found at offset 0xb213. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 9.68 ETH. [TRACE] Execution path: 17% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x84ea7923feade8642835fd75c1e6410141540eed 0xe5b8852c57cdf49115264b324e1813d01d66bfcd 0xca26d95c7a87570c2b9231b1d04a127544496237 0xeb274827d21a530b29df89f8ef8f1ef6247f4ab8 0xfa3a4d7526dd18def0bd2fb2ead61d82e864e32b 0x33865855947b4aafdb7db0213265387c0b3dd7a3 0x18c95fdf82bb8e24da230afcab7a7dcb531e49e1 0x7db07f3270a481fd91aea52fa7e59702b07be6a8 0xa45f95d7a05dc96960b6104254b309356c31a323 0x909e09a84842f4da9d3f3900833763a42308bb0e 0x8204d7bc47597ed924cfba853af247aa0644ad80 0x3ed7e936f2954da950289e358c6b844f0935cb72 0x76c61b6140600429f50de5ac987e41672047cc28 0x36ca460068cbb31b4672412666db6f4302d1ebef 0xc8373c54b9c5e369d581b35bddd1ac78ae7ff9fe 0x34632669fcf626995893e710aeefb2e4f3ec766a 0xc3d5fb73cd8542e9fc32c4565d30371e92b8b72e 0x3a1eebcd3702c44ea265ff4a32cab7a83500daf6 0xaa401a0f5702a8cdc9a17c5c32c4468277929bcf 0x9c850771b321c6e7aa909413b5cc98c86ccba96f