ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B932E901143E
|
Infrastructure Scan
ADDRESS: 0xc0fec5716b6481d0a4002c9784c6b4eb28098877
DEPLOYED: 2026-05-06 10:31:35
LAST_TX: 2026-05-07 14:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 5968 bytes. [SCAN] Analyzing visibility: 1 public, 1 private methods. [MEM] Tracking pointer 0x36a6e83b in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 8589… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(’81bba1d8…93eacde4′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe4b3f41fda014d6ae89847f3050234e01d89541a 0x0826ee7936b9b0aa809e903d995a83e4c5e48e57 0xf90e758b07e68935e668f3c3fa8a63c751f69810 0x2c6d5f6e724b3088cc6fb35f452bb04087e831ce 0x2f7aef2c62af167e440d851cce1e76764ef9ced7 0xb382eef0d09dd4ab70f7be6bb27d4843ab2c7a1c 0x2037d673885f0bff8c29cad2d5cb4807a001283b 0x44768744a5b28cdc05c9c11409303996c706823d 0x6e621837324ff4a9e58d88c3625af7eacb2fd4a2 0xe2a7c08d9f2e251fc6d2eea43f660e8e0b6dfafe 0xee941d0453a3b042e93e0dcb6293ea7c031878ec 0xae13e76d925af377f67ca0f4475aa2950dde2e33 0x7788139b2af33326de4034f3c46119d62c79b2a0 0x1dd3ed46b3007cf2173103839ab3a4f4b922c7c0 0x32c842f29aabb58a7f8306aceb15d45a33c9c2c5 0xbea8d96dd78ec60a355e072f3e747ebb173f0744 0x2f8fbdb6782a2ef6c5e5952ad75a406dc89efbdf 0xf1b8bd3f1b4fac6b8502cefaef3155b83259ca66 0x8f4407f98725ecb2df54df9df44bd08deb10e29a 0x688c667f76bf1788f3ba3e4128791817c9059494

