ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-98C4A6DAA513
|
Infrastructure Scan
ADDRESS: 0x4ee6933840b325750320a9f82647e3d07c8cc45c
DEPLOYED: 2026-05-17 17:07:59
LAST_TX: 2026-05-17 17:46:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x4ee6933840b325750320a9f82647e3d07c8cc45c… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 7.76 ETH. [TRACE] Bytecode segment 0x12 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘19618b0f…d25e83f4’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4b7b39d6b8702888e18148109becc4734a880659 0x2457f369dccba0d4c3671af6623a914ec93e079a 0x518d90e56f12df909568a4a55700884e8528258a 0x548a2ee3f350664ceed3c07bf9c7b465b6a7e1c7 0xa2320fa7d89e3d3af689ae837eb0fea0a889633c 0x2b666a9cbf29ab69339e3b164caf9db7ce3d1385 0xd9b11c51cdc43429d685f68f849dc56b540d22f7 0x6314155add9897b1985c3ed156bfd5fa55b4f7fa 0xdded06bd4a42b756b06451818c0c4bc89b6204ab 0xd9d4615a1c0bb2a429f8778b8c81159039b1574a 0x9ac0f4e7a506b52ba0f5beced2d91e5a5a4cb1f4 0x203284c6c696c34c2a43606f2af61c9e785f5415 0x39d38ad5209807e3cf7bc121e7c2635c154aa70f 0x326c13dfcef42f5b80c9ddd9eb29889506a4101a 0x8c29d60d032d0878a3181a424c0a569e512a1e4d 0x1e21ca282fd415c975adef3fb8afb5641f6dd07f 0xe491d739444dbe96b356d5cf776f1e5f188a2358 0xa9d7852dc4b1f58c4c96eccbf8222a4552f69d8d 0x2a80cdfb5751f27d18ec0ca41cb78cdccdcfd605 0x6c1d8785e426de98ffebce4ef9889dd48a1528ca