ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-474E462E1F36
|
Infrastructure Scan
ADDRESS: 0x136774732363deaebab0ed39fb9010b1d023243f
DEPLOYED: 2026-04-26 18:33:23
LAST_TX: 2026-04-29 09:37:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x136774732363deaebab0ed39fb9010b1d023243f… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 9 public, 3 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xeb72. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x7a analysed. [VALID] Gas optimization score: 74/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6cff4121ec6cfc5a890ef9694078394e23690f83 0x668f6c3913b044aa928b6057b278c9c2454e0a03 0x11a0493da1f70d453095d7bd958b5ca2f531b0fd 0x1cc582dcc47ff84bad0461c55966858e96623c66 0x5d6fb60d06d063e2c5560a38c890afa0b66b1be0 0x4ad89cc3865ed3dc4f8dd727e372ffce9098f3a7 0x5ecb42dae51a75356e600e09969d8c83744945d5 0xab3b92e318f5288ad77fcbaacc342479600e3074 0x056f719731e1f6e4ae8539f7356fe5e727998d35 0x630d85eed82e92ff7cbd2f179babaf88885aa2eb 0xbda866d10150b73e41441c0ef52d75e5e4e9a6c7 0xf957c94763ed1e8211a19c8a73c862df45690ab1 0xa45921b07610b046b2e97562cd4f7c749ae5c875 0x117ddd8aeee35f880031bd5cdb5f3f781e7126a9 0x8d27ff08daf412425aefd37d0953a672c1410283 0x42d5a6d4d019ed025ec6af95356217303ec71cdd 0x0768c2989c42385a91cc5386a34d974080837433 0xf22a27f49d0d98b39a1242581bf2479db31dcd62 0x220d619a9d10425803feb0c4948f00ff260b1156 0xa5443ea6d66c65ff1c1963d74c6d980505aa997b