ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9EBF7402FCAF
|
Infrastructure Scan
ADDRESS: 0xc025f03c3a76aa0956ca5dce9598764e1f326529
DEPLOYED: 2026-05-01 14:50:59
LAST_TX: 2026-05-01 15:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xc025f03c3a76aa0956ca5dce9598764e1f326529… [FETCH] Entry point found at offset 0xe12e. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 70907 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-EF21063D.log. [VALID] Finalizing audit report for 0xc025f03c3a76aa0956ca5dce9598764e1f326529. [DONE] Report exported to IPFS: 3f0d3278…a6466ac8.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x23d03d125b7ac7edf12bf30d82333bce831f945d 0x890b226c49510531d22dfe09663e2dd0a34a1d41 0x8d204d99f65aaff912f769b38d4bc215d8784c49 0x8a44f1650d4722972097c78830590c623e4d0afa 0xa48e4ca8c2911ed8e550c3f94b776202e6b91711 0x33510c4c96e7aa437b8c54d0db5ae930de2ba229 0xbe6807581294f5f6fe67a250a3fa1a76875dd25e 0x81b7e4eb283d6876d3677446016a002b8c8b0392 0x525e479ec68440467996ede9e22af089388eaf83 0x3f7167c671ad2fc531936db67d1fc51180a4cf6b 0x321e677e4cb772094f69acb9e0b56baf4b4f5068 0x5f6710bf78b09a1dee52eb2278f933f440253dfd 0x536813344cbe215491ef635d883f54102055ea87 0x0c224b6389607a106e875a56ab81a981a89fa487 0x29399b8893560a4f7e8bc756571283e62824b923 0xeb2cd16ce9b49a52a69b4070fe4ab13b1b8f8dcb 0xe85aea589ae513670e33890eee5d5db391abdbfc 0x5fec807ba7891f565bb060d617a6eb7ca14e3428 0x7cca899786a82297bfa8035b9b7572095373b02e 0xe168fd6fe1cc08d4af418660f8edd8bdbd74d907
