RESIDUAL CODE RISK: Code Analysis 0x2ed526b627240971ebf316d60268c0dec824e354: Residual Post-Deploy Debugging
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BC92CACC2586
|
Infrastructure Scan
ADDRESS: 0x2ed526b627240971ebf316d60268c0dec824e354
DEPLOYED: 2026-04-28 17:36:11
LAST_TX: 2026-05-03 07:28:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 1480 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xcdff859a in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-7FA6BFC8.log. [VALID] Finalizing audit report for 0x2ed526b627240971ebf316d60268c0dec824e354. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd8f4d04c2398c3835f8154385943b3cc1b6b2059 0xb025c5b2a4b453f2407e0aabf3110c5f9e9fa5c0 0x5455355626a57a13695aa05eca95d4bdfc8f7257 0x4f88034b51381e8978b3ab3b801aa7f3a4095dae 0x739554ecc540714528d4295df72b0227eb2da308 0x63b8f10ad3f33cdba8fade9ced43665790ec15b1 0xb7aa8d7b0326eeca1e91ceccc16e8c86d3611041 0xda7514ad3b2b3ed739b529b3d0897a18c2dbf80c 0xd118219f6636674ccb03fc5a8a09df4cacd8ad3c 0x43075a21a81b49da63d68e9a8eb1ace8ea4996df 0x4e958b4376e3600665b573106ee34f9291f02bd3 0x9065bc09d705d333a1a619c638891f67365f4b62 0xb39686efd958febc06645616c6214f10800e5044 0xc96f25009d2dc69777ad2051ce54688a08d15eeb 0xdeacffeb4cb228383d5fe1958d0ab77fa72fd3d6 0x1dd76dd680b567133166ccedabe2d9e890530c1c 0x5ee204c28217e30b45784ecd9e9afde029334a5f 0x160b713037880a41f059680153d595c801f881ba 0xf782e00248093651d1ec2e59ba9f14b40adc9b43 0xe841d44c957f14384239b00bcbcdc391e6d46067
