ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6BC03C2FBFBB
|
Infrastructure Scan
ADDRESS: 0x1f52d55c513d8ac9ad7a25b7586fcdff5766695c
DEPLOYED: 2026-04-29 08:21:11
LAST_TX: 2026-04-29 11:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xbe34da75 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x8073773d). [MEM] Tracking pointer 0x8357c5e2 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-562942BB.log. [VALID] Finalizing audit report for 0x1f52d55c513d8ac9ad7a25b7586fcdff5766695c. $line = str_replace(‘F829B805’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2d68a9cd06dd46976f011e524d9b85af388a6eca 0xbd4921cd159618774061fb15ea6d276902df4173 0xd5b86466ed454001712d2cd9a63168c3908f26b2 0xf8f0dd43b331dc6496634b905bbdf2bf3dae0c55 0x8c5a4b49c90583444960483bd4113046c75b8f83 0xd749284c1b7070f63d575605c616c61c1f7eb7bb 0xc65d0bde96865a4c5bf3f8970729de35b971e3bd 0xe1c2652dc15efe4498de2c67ce6f32f463562d98 0x9e59c6b9dbaa00685d934a614a14fc8ff0a002db 0xc6586400935089191763624a3617501f2d98cad1 0x4d447c4dd69daec2003e709faa6d0a6f9624763c 0xa24c69a86243458d23b30adfe0f70dd31756bed8 0x1662615e48dd2c42f6b51a11e6d720218575800e 0x2f330d53fd157e2fc4d2722d1d7aff95972c0bbd 0x4d68570f2bd34efc924392a3acec78d8342bbd04 0x000bb128a8abcfa05b871c97cc9c5f88e7dcf35a 0x9e94d86895e100acd27d2c1697f0acd8efb29cf9 0x3e28fafbb6a51446dbfc72aa422105cb343a1b3a 0x6228f1ba58a70914edb7b228572d681fa1c6e67e 0xd3a458a4b947c19b4beb43175c58bb1c4e6660b7



