ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37545492C92A
|
Infrastructure Scan
ADDRESS: 0x321e677e4cb772094f69acb9e0b56baf4b4f5068
DEPLOYED: 2026-04-25 10:24:23
LAST_TX: 2026-05-01 02:47:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x87a3. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x9b. [TRACE] Call sequence: 05da -> 1093 -> bdf1. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xc8dbe73227442e62f5cbdbf2528c2c3f53e31e52’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7f7e156455e36e375cad0bc3e95e25d18db9c6bf 0xdae4928f51ab7119a1d974aab582f560a2e00d58 0xce60069799f464e274d451d69ed5ef2c60a53535 0x1a94cffabfec75c566dcc09b1d5b3557075fce6b 0x140d06e0e031995b842c0c14b21d9ae8bb035577 0x1dd262622be153fbf8e80c4577d8e62d20880047 0x3247926438ad4478fce99a4a05af3aa6285b7278 0x36f708f6276717e8c6863adb4712d394cab49eb5 0xe5c08c938a0f9ac90a7f7e881b4fb21905ecd6d1 0x2825921590c6b989a305c1bf43884d8c14664268 0x33016bf8b93d7bb7bb8094876bdea24bbf26a3ae 0x44341a31feb92f0f4f98416ba18131ecc05c2863 0xef317e0208e0be76f89390c33fab44cc84327ee3 0x4dd13fba19ac587d041646d0d941b1aa18d58c2f 0x2e14465a9e858e00f4302ab60cd7b6c120efbc7b 0x98f965f90000d48445625797e74c03847a9a598b 0x21816ce6c5b4d86cb4e251c1abdf208789227528 0x1b3cc5efb5559b00c32030c95eb91684e2df5fce 0xfe9ef569a24043aed49c4518ff5d604d5310b9fd 0xd00c522ec448618bb292afae3adb310185210f5c