ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DBB3AE13E9B4
|
Infrastructure Scan
ADDRESS: 0x6efdd66f54cbedb6fd16f3a0fd69212ff9ff5162
DEPLOYED: 2026-05-14 13:45:59
LAST_TX: 2026-05-14 13:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 18. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 9 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 4.82 ETH. [TRACE] Bytecode segment 0x3f analysed. [VALID] Signature verification: 0xd3bd8148b885da072625c399335881fdbc0b5a4315da04b9c4ebd837bb3a6431. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x004da976579e4daa444c8cd423621d4689c01b02 0xac6d590bf5d17e9528af312be41a134dc12ae69b 0xcc3f15f48a8f99240bc71547404ee2bb67f33fd9 0xac8e33b18f3c3f56adb02df96861ece5f9b1f38e 0xa1cce38fee6e64513a23c104f7a34358a0de4e2d 0x62ba04fdadfa64314ef829a67cbf62c9b74d71f4 0x81feca5747ca5079c148a7591495fcf23ab102fe 0x79ffd4ca87a3558bd1eb2e1debd86cb2ff88c7e7 0x621727a05db6aeb33118b3f9de3eaf2d8fc86ada 0xb10e10e3d164af7ae1d57482c46ab4eebb655545 0x2e3f73ea922e901c1ef267bb2b8bf443a2a89ab7 0x3c6124612cdf153a5f4a662852af157113e38868 0xaa8b8873c6fd0c80a42ee219e9f543ec1aa01742 0xf220f3cb439b30a340f12965b3dfd437f523a467 0xe569f308baad513d346a0e67f8136e31b185b1ac 0x850ae65abbd28e7f1fb236a40be3d22cfdff2886 0x7844fbd0d70cbb1fcb76b9ff03c259a0654d9d60 0xcd6b03a67d5324d070f5d11af7d451139ffebb59 0xafa3188dab6c447a8b413021fa90e74da0524fc5 0x73e030972ded00c92091c712a167c03cc65285b8