RESIDUAL CODE RISK: Code Analysis 0x407584d4964c5ce0ea46567d2a52c3fa98588ffd: Residual Post-Deploy Debugging
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F1DBE199E435
|
Infrastructure Scan
ADDRESS: 0x407584d4964c5ce0ea46567d2a52c3fa98588ffd
DEPLOYED: 2026-04-23 14:03:47
LAST_TX: 2026-04-24 10:47:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 57. [FETCH] Hex dump completed. Entropy: 5.42 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x33e8. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 18 iterations. [TRACE] Debug: 7be70f4e68300926. [VALID] Gas optimization score: 97/100. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x60a91420c98c8461e20e9a6dda555e21c7bdbffe 0xefc9a774dd0e178c71fae1b299274da5af6a4d8a 0xdb6ef9bfcf97461a9f54c1968b763eccaa8e59f9 0x0690d279238dfea625d1bbec77cadfeade03315d 0x7b6d44e248bf2803c70f3587a48ec1895789d389 0x930fc1f5174529c522e2e42456f174a7c24d4edb 0xfc346540521980012248df89ab68cfe659510b9e 0xa6f49dfca6668e1d520c8594452c6945eee596f1 0x5fc3d0caff59102536b49347655ff642c65bc9a4 0x88a4ae0dceb51cf79e737b72379fe00aa273f26a 0x5d11dfc3aed37bde9fb2d7f640faf832dc7dbc40 0x3ae4b1c7d43eb4b506fd753eb79269ccfdf91caf 0xe3c7802d405e71bdcb658dc14cf573501e0ec3d7 0xc53aa7eb83e7063e96b550df28f7f9387f31bf66 0xee203d22ac232e8bd2b7a78ea32efb3c121c9870 0x396602719dd0c6dfc1cda76d7e468b92d3423167 0x1ce56fd74842859bf51252f4cd991c9f3ecb5c95 0xe6965964bde4702765ef8766f859720b0cb9863f 0x378b5e71083b3d64e26bcb622748a0d3abd1a9d3 0x18a79aff8db992c6158a4b0338818179e8bd05d4