ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3025217E384D
|
Infrastructure Scan
ADDRESS: 0xa78846573c4eda142dfe10335f560a5cf3486894
DEPLOYED: 2026-05-02 21:08:35
LAST_TX: 2026-05-09 16:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 46ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xd194. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-69850ACA.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘620439b4de444718df35ca4d02b657ae91527e05638394bf2ab608afe72ea77f’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x237e7343185e51d0baf334c87005d0d5bafdc701 0x16ff116a6e32f827aae19b81ee7aabd91029f6ae 0x3d208f71a928f689a81172e69600d143953a34a6 0x1304b2cc6e0a889596b0a0ba7e2b0dc3f71da3d8 0x6c8728679deb5cd628d6a89b3381e94ad0fcfe00 0x699cd55a26840ac7a0d59147ff419c40f7ed01b9 0x0ed2eb2ab578ae55612262b58986a47f35498798 0xf036a5e274636c19645e0f3568cf6e826ba89020 0xddaa00f9fe3b3b8d8c3608a37437dcf43d428a98 0xb8673eb9097816a3b6877ffa775966a399ce3c7e 0xb2a4b28d31f7f0dd7fdbe8a158ae70bb5f0a20f5 0x6add81b2fe471da6f2cc1daa1255a62508c61f71 0xb517e778810ebf6cd7892c08007a7b51ce25f44c 0x96a389ff86cd047c85ce45916e6bae5f23727cd5 0x5f7980dba379fb940186a248f934c0e224c2d6ed 0x1a8410482b6c4df389e62f260716a3759ef51d66 0x8b87c4fd61aa24a578ba9ae30d6165d7445215dc 0xa98c9acadeb6fc58f62956ff9be5d56e13751fb7 0xe3b7aa1be119f4885539bda66ab1f379d86e42a7 0x16525c8e9841f618b8e42f32ec77d403fd68de62
