ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-656D43168F50
|
Infrastructure Scan
ADDRESS: 0x76405c21f875f9328cca9e87316a22388c6bb3c1
DEPLOYED: 2026-04-25 22:07:23
LAST_TX: 2026-04-29 11:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x28469a73 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-D03E1C62.log. [VALID] Consensus reached on node cluster: 9/10. [DONE] Report exported to IPFS: 008d121e…73cb4394.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf704b7f1151fa5c3f6a3356bdf6e9f27bf168fe 0x66d55fba81e3152ef1b35038bdcf204cb9cd6b87 0xf6d6c3674b617c548249061ac018f43188c874ad 0x2585275a8c822df5c9416875ec61a5c3a612e024 0x62756136980062f2d737ad94b62db68d2fe91cc9 0xca20555c30b5285a8da722ef2ce67ceb271f1e5e 0x4b96d1159a038bc029e9e22d0bb33bc2a63f2b32 0x17fcb4a72e572ef6cb767040b848aa498c5ed0de 0x60e52a7c83264df8ef3763a710a4c420011a003e 0x4c9a5516ec5a62095a4cdc71b4519a6935e29341 0xdcd7ff5adeb8046a8cebe121f0c009be7b206658 0xf66cb454d1f30bfa546e74cd0d17da6bcd10bc1e 0xa270d2fe6f2c8e35b1efe6b0e66df38f750af50a 0x37d85d0988eb4568930dc1a9f8b7ccde563e0bb0 0x605007f08bb55164c165c58db194251b25b3df80 0xb9a5b8e03728522295b44ebc76a275ac8d14ee06 0xea61ab8efbf0940b4cac7f5f5960d1b6f5abe28a 0xcd24167e0e68c0886dfb03f6e523efe9738ab256 0x52360b363e6d8db0652c47113eb89b0ca4503df8 0xd37667bff2f58d8276cc270898ec2ac51bb05c0a