ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CC8DBEFB1938
|
Infrastructure Scan
ADDRESS: 0xf5c8aae462949fb37ce7f50c5281df6a805cb2aa
DEPLOYED: 2026-05-13 09:01:47
LAST_TX: 2026-05-15 02:35:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xf5c8aae462949fb37ce7f50c5281df6a805cb2aa… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0xf2. [TRACE] Stack trace saved to /logs/TRD-1DD77BC5.log. [VALID] Generating cryptographic proof of scan… [DONE] Log signature: 01554274f3f7a92d08a3858d18cc69dfe41543003f46c339fde930277249a449.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd5f419fa83099553a95df69260d74d97363c915e 0x2172a9bb484a00101f2d0d612bb7fe54cffca72e 0x1f3205ab3b2a85697372b9f53c81200fc138e52a 0xff00bb7087f1f24f00ca4493e99d1ce84f7a8e21 0x6f361ed359110ab284ba6693dffb5e7f6c96b192 0xf062ed2668c51b1fb82b151765c14552333262f9 0x4f07981db60fb5f025b55b8feb6742533dd9ee71 0x122d4bca7624a4133c34ad0143f259bf196c4dd5 0x672fca48a1597eb904e099debb4dbe4b82920d55 0x8f43418f92afa12edabae44f8452bba67016ddeb 0xf49bb3d33bc7931ff4a7fa3c8ca09752a5904931 0xeca9f87f3a5acd7cfc2ec723c8183bb71adaccb8 0x5872b18cfc1389a0982a89a51584fc2e5f9a7a19 0xd33dbad8441c303e31202bdc33abd3a6f02027eb 0xb0c83777482b9ed13e79b246770a0818b0264b53 0xaab18f168589075916f924ee3f1b736fc2bbad7c 0x76fbc787b5d608348ec908a89b48573850bc29ba 0x09efda1c980ff1e5a272fde1ffb868fec2a89553 0x09703ef11f6db2794bf72e4017fdf5b4c42a53b0 0x91295c422502f622326697c304b283763fcc2421