ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5DD3CDE1900A
|
Infrastructure Scan
ADDRESS: 0xca0626917cc79fb22a87fb2eeb76076ecda073b4
DEPLOYED: 2026-05-08 05:55:11
LAST_TX: 2026-05-08 19:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xca0626917cc79fb22a87fb2eeb76076ecda073b4… [FETCH] Entry point found at offset 0x5f78. [SCAN] Identifying function signatures (0x916d18bc). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 31 iterations. [TRACE] Program Counter (PC) synchronized at 9150. [VALID] Finalizing audit report for 0xca0626917cc79fb22a87fb2eeb76076ecda073b4. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1974cfe3c1468d72ed1af94c7282853df2205cb 0x073a9704bf870afc72a1117762be1826716bea5d 0xf6ea36da7e394c2c07d7bfe9d81b1fbf2c6d45ff 0xad3674d88b66d7be9cfedd7b838b6416cc684320 0x65d09cf06f473fdfbe8343ddc3770c1e9cb283bb 0x5d2b1a444607b457c1a5c17f5dc0c1f0c406ffaa 0x49f1b30d8a2ceca2ea6466b1e3d2a886571223fd 0x53a42417c2cd7b7ef0a59a3717831cfdb42c6bde 0x3e3040e2311d7186d2a42041c601bad6db566225 0x00c012d00bba18fd96514b8a636fc54125ce2bbf 0x42bab297f90e6285546f05abdf4c42d8415e9794 0x9cf03af0b74270535560d0adbbad3297edb7d185 0x2f79f8927599c01563c0162946994c0af27c6c3d 0xfc8a700e3688855b11ffb14065a96477d4ad7e2d 0xe68446f9809fcba0af2bd9da2cb06a4248897fed 0x9587bda288b1ce8438294400c8e7f778df32fcf1 0x477849699d2c37615ac76d6da9244253e3ea1ccd 0x576d3bec47e1673aec8676dcef49fea49b372f50 0xc7ac95eeaf8d575f6d466bf9d3d8d6da8891faa8 0x2958270abe870d5d686ab2471d0eeccff73a17db
