ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7D7994230B3D
|
Infrastructure Scan
ADDRESS: 0xdec74e5889bf3b0c5a2012078f8ef116e77e99d0
DEPLOYED: 2026-04-20 21:04:35
LAST_TX: 2026-04-25 07:07:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: ECB5AB7A. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 90 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x48 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 5e254557…c89ebffe.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa56fa8d6317c53a7c40bb84cc6733c9591ed1097 0xdccf6426a315128ab0fac5268bd6fd9ae39677d0 0x22056a2eb636233bb3e29185c0d09c6c51285450 0xb6e06274be09ab116475d8674d1ce475c04d6659 0xac66ccabb204124b62e5e02b0a7707c65daecde4 0x5d70ff81321a6e73f5af78f147e27cdb096e264a 0xd9f6c344e557b2f26e7d1fbd0e492e0568d095f8 0x67f967b755f58830587141ecc3dafc10f3a1f69e 0x7e5033358231edf7751794cc95dd9a60b7a1ff09 0xd71a3765b8368d37a8bfaabbfaa6d475df93628b 0xe8bf0347e87069eb2ab6e17bf22a4c5dfdd4ec63 0x5053e1e409087c61cb699b1285dfc7f89f628010 0xfd65276b5d449ea747434cce6a5a32651c8d0e05 0x96122fe0eee3774a0b2b6abe01f36f547ff02d4a 0xa7bd460c4ca8ec999b658648b64a1687fc534ef0 0x1418489bd2353a00b2c728b959aed3bb5dc8508c 0xfeb6ca7e430066951786a6f61b800ac9f32ad98b 0x63b88dd118c8d86d7369d9eea61f7ae127c5d236 0xa73c653f69c469a2216b1901ab8b823e0fad2e86 0xc4da820c2d5feb58588f566bc0bd01be1600b624
Post Views: 1





