ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1F45874D41B8
|
Infrastructure Scan
ADDRESS: 0xae1b8d2b296e1e1f5c73eff0c83d850033eb21dd
DEPLOYED: 2026-04-25 07:43:59
LAST_TX: 2026-04-25 14:01:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 2504… [TRACE] Call sequence: f425 -> 5f6d -> 9da2. [VALID] Finalizing audit report for 0xae1b8d2b296e1e1f5c73eff0c83d850033eb21dd. [DONE] Report exported to IPFS: f702813c…5d4e852c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0210320f1817f076c65cd9b075107ab4d58d8963 0xbd3898de1637ffb50c0b12bb833ba346a4f8edc1 0xf23da29282dd620998586c8e9ff95673c094843f 0x46aa25fd930923623d27f9a45cbfe9aaee96eee4 0xb7816a02ba215a3f64eb9d599d9d60a3a9a58861 0xf767568e2b95db044ba994bca11ae7464d72b92b 0xdf8433c6ee57bd07f36dc9f06ebda74800bd88f9 0x694620e3703b25b75f9a6310bd24772f83fc7e9d 0x5e723f0f226ae162f5c8e4868db2da905bc8cc0b 0x804d3ceeaee5f68f5de7578615c6ac5ee5eeb712 0x8a587424edcdf5d53d6fc5d0a573af74ce2245f3 0x2490e09217b2c9a2e4ebb482452f51c7d6367e0b 0x4aa6117ab50f9d347bdb4aca3400a70375be2652 0x516bdd2fd693180b10c51b2b1a78531ee71dc587 0x36f1821869507f78ced909bb0bedf00804904b72 0x669727c1849343d198d34454af1c4437522d0e9d 0x15939ff561a3d642b5d08d47bb3a03a344835ba0 0x20205935dcb016d6219bdd3b5938fe898a54b818 0x31672c6f81bb02759698810c8b9eb37359c1d4cb 0x8f3a7334777fab4aa6bf7196774738faba36a94e