ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6D61705900AD
|
Infrastructure Scan
ADDRESS: 0x75d9ef48e30bcb0b658c1d387233fb52ebf9a4fe
DEPLOYED: 2026-04-24 22:50:11
LAST_TX: 2026-04-30 23:15:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x561401a7 successful. [FETCH] Bytecode size: 5370 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.41ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x1a. [TRACE] Bytecode segment 0x29 analysed. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘be8b8c8cf1418cf16d05471cdac355a9a5828e85f2498e9bd25d6230d13018fc’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1324a54f02eaccb5211db1bcd67ec1596dcecb9a 0x2f00c9eea76389ce284409000747f70d833373df 0x52360b363e6d8db0652c47113eb89b0ca4503df8 0xc3bd21992e53aa72da9db7af66f9879bd8c10ba5 0x13c7f93ff50de1dd017a14561693e94842a3e784 0x7b69c5942e2e9f4dbf6386d683325a9a143ecd67 0xe8fad69d4b50c190965ab026ca944efc73b7849a 0xebc250f98904d8adc758c3f37d9ffdd372ed1615 0x98159ecff13b798a74d38e73c572fdea2e94b216 0x6c839f365c913daecb07d0fcaeb1c98744a22c99 0x20b672609664d724c5bd86226aca5b8e0f860f82 0x48a8ee7a6933392351880082335b84f710e785cd 0xbe0963c43903ca02aa8f93d85668abbc7bc95df2 0x6caa1627e419ab79efdabddb1f58d9258dff7f28 0x184b61a74c270eb2da0e19da626b830a28726961 0x537a3845c724abc5457f7c6a87510084d52921b6 0x7daa6d79cd4d6ef54468c1a728abf4ae7d6ff76a 0x008b3edfdc1cb29de0797f02c81fea81f77c1942 0x7544425bff2fd45da9fdaadf49d221e4e51d2352 0x3ef19375944a6a448f0ba71189814c48b9e21b17