ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1F7299F61D64
|
Infrastructure Scan
ADDRESS: 0x9ad0f1b4c13b93997e8b75d60217d943e54690e0
DEPLOYED: 2026-05-02 09:43:47
LAST_TX: 2026-05-02 09:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7305891d5bf688822cfb3888973054959b7cddc6 0xfd283ac37d1051275c0248e0853fe55fddc8e307 0x297d2b4d6cf2f4702f89662c4b05583d2cc3467b 0xfc375e51ceab7d893b0184215e99fe6273615b85 0xa652d4bc6effd09ee2a16fd327a30495bf60f91d 0x0fc216af5b03a66edc7394e6e554f1c9a5e5dd3b 0x8d46575f3981c53eb5c6f36a3d8478f9e247f205 0x106fb3466de6706b8360a8617c7b47b25fff05e1 0xc90799f9c6a2e0ddbaac4087e9627f7c8d892150 0x7a328416f980888de20cf398777055b9ee5a4127 0x7153224f07cb14c5143d6c7bab464d798d4020cc 0x88798da9934113eb243007c72337c25595daa07f 0x1e544f57cc465e3f87d061b79ca484a513e19d95 0x0a991f72257e64fa296da776c90a26c7cba28711 0x20440110c2c97e5099712f3050bad750008c8bf3 0x07ebbd3a7214f215ab10b64e29229754e5131d5d 0x43691cbc299a337a3122b625011a76aa7a85cd7e 0x3a7f0240be80e539d543658bedaeea9e42ad1aef 0x97ed799c3aad030dd60477b022f7b46b7c54de91 0x0a0eba728c6d02c175cd6a5ed63068b2e0f6730a