ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37B74AF44CF4
|
Infrastructure Scan
ADDRESS: 0xddc6d0037c96d3a252e7c9daf9c5b6826f74b322
DEPLOYED: 2026-04-24 07:28:35
LAST_TX: 2026-04-24 07:39:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xddc6d0037c96d3a252e7c9daf9c5b6826f74b322… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0xe069a6ae in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 98174 units. Result: SUCCESS. [TRACE] Bytecode segment 0x8f analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0828a11118bc70fe123f3f02537ccd9c4dd78452 0x129a655ae9075657962a466ca9ba50f0305463b4 0x7d096ec49252893cc7754ae3cdee62ba019fc9f6 0xa8b3779d9c686ff6c5b40f61781b0ab81f65ee20 0x2b4aea111377d6537b9e3c17f277088d1569e7fd 0xf162abfcbea8941fdbf96388f2169f739c878296 0xf8d762b90bea83dcf04a784e2defe7931f7ef690 0x2001927f242ff7055c9e2e39f5aab890e3c1d857 0xfcfe8cf84fce2734b7a78ea859bfb1e2d092c286 0x006c806d316ff3cbcd6ecf7eaf2a7dfd18c00c2e 0x5e5ee37dce2569357b0c6afff8e03e1dd8345ee1 0xf7fc896e5d7e76bca0472367f34de31e844bfbff 0xc698761bcee9365b9d32350e8d8d74f677b8303a 0x41963fd6c60a0369d0ee2219418fd2d482c9c902 0x0bddf339ecd8d7c741f725886ce5295db1423438 0x81e5abc53b5c933b85b29da79ba59a71571cdb84 0x011581ef96b744b0796aac62fa40d4055a87d9fc 0x8fb0583176f76ba10744c2b5e28e1f34b07c986c 0xc7e4254a72169fdf7a2e080462724f2f642daf7e 0xee0deec9d92f62fc43ee71c1eb239f7900d80721
Post Views: 3