ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-59850BBD5E68
|
Infrastructure Scan
ADDRESS: 0xabd945d7c58d12406e05e071354d34d983ed972b
DEPLOYED: 2026-05-08 21:30:11
LAST_TX: 2026-05-08 23:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x6758. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-EAE40495.log. [VALID] Signature verification: 0xafdf6c8e7b492210434d7c27778452d58f0d3f1a12d43396b0064e3ce118c337. $line = str_replace(‘EB23DCEA’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa66c864f3c31894b7e1b21192c2a18121491259b 0x19b153d07302d305b3fe5cd9bbe6927eac52090e 0xfee3ee55db99a374838f5ccbee0551a1da36798b 0x67cbb7e363f3c5d0773fdf867b8c73c523a1c6c4 0x2b7be853694c6538dff2d69d8915d5e499816187 0x0e953ffa9c839e154483ffb2172116eb0fcfcf07 0x6b05d350a5052fee31d7eb9b274734eb551241cc 0x2ce3837255c9d2ac2c57f8784770307f4209b156 0x8f47924b0cf8232198ba8545128893c1e2135888 0x6cc372c2e386b94e03b3c44e94afeed2b6a332f8 0xdcc8aedd298c563e47062ce9871c783313ad4a04 0xc26c978c5b7335585f0574b1b86a8e0b7df70729 0x5ecdf65f8280238e1795168ef0fa66ce93bcc79f 0x6204e7965861161964072d2b80435669bb3408bc 0xbd4a27130228e307ca5c3a15f9960189b88a3a50 0xc5d3c0ee27089e3e62cfaf8af2d0b0a76de38381 0x1654a1defb03d54f27aa00d0236886514c59304c 0x262e80e63a900664d2513b7910ce665ce7738998 0xef4164f3720ff912916a71ca6a83b732213fb6cf 0xf39d3346b699eca64f9c88350c03456ca0eded30
