ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EA0E4E22A78
|
Infrastructure Scan
ADDRESS: 0x1c5f6036a61e29b743c8437792a452e58835c21b
DEPLOYED: 2026-05-02 07:52:11
LAST_TX: 2026-05-02 08:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x1c5f6036a61e29b743c8437792a452e58835c21b… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 9.96 ETH. [TRACE] Execution path: 91% coverage. [VALID] Finalizing audit report for 0x1c5f6036a61e29b743c8437792a452e58835c21b. $line = str_replace(’82ff45dd…d97caf4e’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x87b37d2efbb949a0a4b360d033bd5ee3e611c8ad 0x64910dc76c03cc952f748219ec5dfd6109d404c3 0xa83998410201e2ed4cb3840a61ccae3dae824be6 0xccdbe011ab0dfdd4119b74c403a12cd1df481c23 0x39df48ee46bc1239a8ce6171e5cfb63f0aac47fd 0xf4fa2deadf2918534475822c66952340a7714b05 0x927d4ae8deabad7f7480cf96299122b7fac096d1 0x33278f1858a4222ffdfab37f811fa11539e4659d 0xa6dbdd59318e212ad3eb6ca002d5de47195ca27c 0xf118851a98a0a1358d0ea4343c455e803fec7c1b 0x38baa0dbd118c9b9bbcd451350dd8dddaa6b4515 0xe7acea2b6595b005c0f679d11fe05acff770c25f 0x4aabbf405904fbe7998377c95b050793bd3b86d0 0x554c3a8a822d127caaf433e4332340136e9ee913 0x17a438946653a6b22cb94866f9fadfa5cd585486 0xb28d8fa707e45c2121fc40993983d25ce0bdf1f4 0xbabcfcde241824bc7834cbe7abd5325de2e61d79 0xb1c5b6debe1c3efc72946243e4d4b12c9ded6bf8 0x8d0091e55dbe229215870e88b05b3ef1161029d3 0x205cbd3996c140ac64f15f94317a28b899b85444