ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-16517D4B3060
|
Infrastructure Scan
ADDRESS: 0x5efdf0a3b5790d7a12fbb677fb99f5dae9c2df68
DEPLOYED: 2026-04-24 12:25:11
LAST_TX: 2026-04-30 10:28:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0xe186ca53… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x4d0a959091d76d8d6ca978677ad7e42eac69da5c’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbd46c9e00e5bd98d2d662d3253e2bdf9509a182 0x1a583a47a516ef525ea8fef3a9b5f4b1a0372e6d 0x4e6640775b2abf669452d0855c682f01b25bd7bd 0xa18487a3ce7322297d68bfdbabfdf0ea8487fd4e 0xb55a70d3a4a6e53ac80808f36316ae3abf909c9d 0x1d1946e1cc50545c2a10ca7a668444beec83e5c3 0x8a5d3958db2c2be9173a180759afc544575b346c 0xd7a0b0932a533944c59d6fffd48428d10518764c 0x7ad7ff96dde95802e8e73aa31378c437f70e7690 0xeb974fc35a59e1f091e82a37e5194e82de46706f 0x5e6fd2f576b9774c1d5bf539f3dc2b0077cc9753 0x68f4df097466cd2aa352c066897648eafc30bd0f 0xe07ae4e4b9f0718d10b1c52d18f8aa9aea5550aa 0x3005d200c49c57282ca381d69ff9fd7c7c442823 0xc6bf89121ce3470ce5859708bad720b4d7b4a697 0xb80bdc917d30c1186d4898f5e98c7c71f61e2c65 0x56de0c1b58f16bd7edfc1b532ac5dc4e07972a22 0x49c9abf453e4aa52ea6b8fcfa414a93e22ba04f2 0xe7e958f8721c540ad10e32185319512cf217e0a7 0x930fc1f5174529c522e2e42456f174a7c24d4edb