ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-970A5F2856BB
|
Infrastructure Scan
ADDRESS: 0xabd945d7c58d12406e05e071354d34d983ed972b
DEPLOYED: 2026-05-08 21:30:11
LAST_TX: 2026-05-08 23:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xabd945d7c58d12406e05e071354d34d983ed972b… [FETCH] Entry point found at offset 0x79b8. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xd2192547 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x6c. [TRACE] Stack trace saved to /logs/TRD-CE9EE3F1.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x1ced39e10220371316cbce0150543b4da00464ce’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x681b88f6c469614b939f277aa65f1a038f9963e2 0x88363f9d0cd94d042f08ae2af4f3cf8bf061e19d 0x9adf4398dff5706c1deb320b7f3b9649f3930036 0x0b394fac72def23b7452469a83446ad9d5de06d1 0x24d9f9ab0ab49d362c7d08ac366bd0f9c44508bb 0xe76278619dde1f71e5f8547d8af9076a76c1322d 0x581a61e6a4ec300aad91b8068a2c0dea6517f6c6 0xc1797031e8e1ac099feae07c1a173e428557ad11 0x882d24301ba9b7d9a8262b99f7a2332001bd3c07 0xbdd558389d3e9efea4ef3787d7a914aac188cf69 0xb1ee10e37defa7d8220c3830cc6419d966ba7421 0x22cc3ef14f5ad52d19391b363fbe9fc5a20551dc 0x4333a4e3aafd2907f54d9c39c5e66ed130f0c1e5 0xcc677aabb6a6b4ca99b66878649f85ad0b35bb0b 0x3c867f9c60d2956becee72f8c04b779fff99b5a0 0xa6ce30e4af9a2d9bce3f6448fb246d6b78b45211 0x8b8fd0830feefbfb570f93e0e40a0a5fe78d3f2b 0x6a05c7811428553e694e9eed0bc2e50510c6d9f7 0x9ea9133a11252475140b069e40b8ac2bb92017f5 0x73d426866109d0a26fa8022010e2433562303658