ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-590FB953081D
|
Infrastructure Scan
ADDRESS: 0xd3c3b2fa879f32f16b4438b19ef62e616514c7dc
DEPLOYED: 2026-05-06 23:24:47
LAST_TX: 2026-05-07 03:35:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0xd3c3b2fa879f32f16b4438b19ef62e616514c7dc… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x35. [TRACE] Bytecode segment 0x25 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x9d3ef23f53ac5967eb0ec464f0f717566833b7ae’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x19019245113063a185f886e21c143749c3fa49ed 0xcc925742b3071c9219d59f3a877e93fff677ac82 0x932ee1d4ae693a392b821121b9bc0e41b0678c25 0x01573a1c81f1bf70b75e5bd70353949660fbbb8a 0x297b20759553bde999e96ec26a81ee1d072e4979 0x50816726a4903049a9a65a041af075a0eda59f74 0x4825c764e141ff20ae592b8e4fa32fa32b1427bf 0xa34104a75f97fc9ad7e9b48c1d20e82c8bee34ef 0x83d5fb62c21279f2c57f28525e06e694f2204a62 0xa928c0b46a78bd96ff8ab356f5ae70a411251458 0x218b7e308d75ced321f18c2ec8be064f4bd8bec6 0x348c663c477326ef9739c2b9a5c1a5cecc15e463 0xd1ef3912f32ff8da100e02b06804073a31bfa8e3 0x66d98bf5a881cd6c149affc6d0b8769e69cfe2e4 0xa0a1bc8ff09b50258667c03e7e956e4b61b761a7 0xb55a48c1d0373b218a394152e0c509c89da003d2 0x3c6fe75049a835595c38052bd7f26a91e9f455f6 0xc9f61d836d7274bb87069a5c15c1c1288a6e4253 0xb0957514af22aad2a81c3586ea9eac280e423a13 0xa0edee1a7e3b248a5fb2c2824bfff749dbc366f6
