ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FD67053DE044
|
Infrastructure Scan
ADDRESS: 0x17035c7632a5edcc64f630ddcb56df31fb594d85
DEPLOYED: 2026-04-27 01:26:23
LAST_TX: 2026-04-30 18:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xcffb. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xe9037b5b in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 9.82 ETH. [TRACE] Stack trace saved to /logs/TRD-DF1A2BA8.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x03d76c14a9b42f09340db9e0afb9b4f07003c3b6 0x8703ed76802455cb93a9de2af3f46aab68e4b4e8 0xb9e112105c9d4fc8ad2bfcea524d2da0fc258e85 0x305bdb829066c9ce15d5a2af0c4267b326c8a1cf 0x79c99fa19b9cb36ce2ed6dca9038003e322bbe23 0x25adaa00a6a5c90d9e2ceebdabe498d8376660e9 0x856cdaebab1b2a25ec27cf26311cd86d6e32ce81 0x368d79ca0b2a877eae595cc2ca1e4646826119bc 0xb8e4f5fb04789f2c0fa49e90798e847ace87f063 0xd03f3392b817a5e1551ac1c8c14016b9bcc493dd 0x403a0292e0ebe1defb03262728ddba7a7c7d4f14 0x79fd6dc03f9b49fcc4d7fcd50d6093176ba9b7c2 0x080d2e02f5fe0a63e5b9c6b84e58c02b1d2e1e88 0xe743d850ab207d9d0a43ec443011144383ec415d 0x035693207fb473358b41a81ff09445db1f3889d1 0x92b3cc3062b9717379afe879e4b7f80533e0691f 0x77c5aef53c6da00a11f51e21fe40c8c228820f59 0x555ec7945f6939ad28d64be6a27bad99b93c7f7b 0xd69d332ef8b76ac880baf2b9156c7fda32d154c8 0x870e8d0e2db6e347d1c9fe5182750ab83ff4505b