ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8705472CBBFA
|
Infrastructure Scan
ADDRESS: 0x351402d93ad6744587c05f641f47426e99ab03a7
DEPLOYED: 2026-04-29 19:47:47
LAST_TX: 2026-04-30 21:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 52ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x66 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf66b0d7a0c1c182e530816cdee6ea062b63e35e9 0x8c5a4b49c90583444960483bd4113046c75b8f83 0x46ad1992a3447b3083d79b45b18bc62987a74c40 0xecdcfc6efa4217aa2985de291b61dd6a21f6a074 0x7f254d36c04b1f0bd89cbf86542178d0025c586e 0x9772794000927785437ee512d8d8064e6df4243d 0x5ebc9394f0ce3b64cbf0cb2ed69edf7c7ab7bd9c 0x74fbdf73c3219d87faec7d471d0fa3938c4045d4 0x29399b8893560a4f7e8bc756571283e62824b923 0x0cbd477178fa8e05d7163b0218e8fc0a42854d09 0x376d0368863e76059a789406a0fbeb3ac3c1417a 0xa759c256c843ffacc6f216747b34ac58bce5cfe9 0x094e5f15b1858515dd143f87aaad3b7a5e218e94 0x21bc027bfa158cccf263e4389de2ea3cf8512db9 0x605f83efb52b6e2c121e2cf34afd9b9920e95231 0x726bbafa0dc19d971062b6630de02f772c23b733 0x477c52040dc9d5e3c8cc89a8bc6c192eaacb8967 0xe2e299d7d4bc45fd72c0b23d766b74e51af3091f 0xcfa99b1d4edfe646c599c620d0a50c5de37305c3 0x0914d01d5d6a67b41f13ac61a5cc8f5b7a47b96f