ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-969D102F40C1
|
Infrastructure Scan
ADDRESS: 0x385225af2ab829d6f7f0098d1acc0ef951788722
DEPLOYED: 2026-04-30 02:42:59
LAST_TX: 2026-04-30 03:21:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xe848. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 9 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 89. [SIM] Verifying ‘require’ statements integrity. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘644A625C’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd554b5bbd169eb3bc691c8a93d2744040a0be8f5 0x806bc099759336f88a1df2a71bca8d6f13f7a925 0x63e6a32bed574024a248cb39ca4aa53e48ecc3ad 0xc6fb23060d552160423aa04841155df7d3cc5ccf 0x668f6c3913b044aa928b6057b278c9c2454e0a03 0x2b830fdf5c1ba98197b20c1b1757399db1d99873 0xb69ff5221e7c4f383c0973f0bcbe2c884ff24dd3 0x0d1657135ab781b55e606d28f3162f41bef0ecf4 0x1a69a154a834f71f886a074f8da9f07610e7a703 0x1aca0280cc46c94bc3742fed1f5418384525cf98 0xd478134b62be4140af9650df55cc42fc0afbf6b5 0xed9bd4fa0169db811d1a764c6d7ad1d8662d108e 0x6f40afc06db9d6730257606dcdb8b173170e1c64 0xab42214392ebcd4bc19103883e4f4d060eb89504 0x0d7bc91264fe4c2988f25b3adda25259708ac712 0xceeb5df29b90fb161a228c8f1d36e2f6192d19e1 0xc479e7f67f88be67567f4830745260d79b4c86f4 0x3cf39b509458e713b49e5198533f28759abdafae 0x6967de7cd3e996b76ae3c1ec84d4bfe44ff787cc 0x6442544683e357c843ebb9eed0cf31afdbeb7bde