ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5774C629748B
|
Infrastructure Scan
ADDRESS: 0x9672e7ba0b7f8a16061d8f900357ac535a7eba9e
DEPLOYED: 2026-04-20 15:32:59
LAST_TX: 2026-04-26 10:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x4e6e70bc). [MEM] Tracking pointer 0x5644c177 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 79. [SIM] Mocking MSG.SENDER as 0x6cf014d560bd7ba9b3fa386cdf9c1cccc389c529. [TRACE] Execution path: 60% coverage. [VALID] No critical memory leaks during simulation. [DONE] Scan task F5EA9CA4 finished in 87s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2eb3082822c5bdc20894d9cff090dbdd06aff8de 0x568a6add63978d72174c35f9ebf3496ae9f23a18 0x6a73760623d06e6fd93da364367357f3cc656f73 0x521db2cc18227b5fffefabc0fb4e7b870d31b075 0x4a8562834726eee897ef0c586d01a3139c11e272 0x1699c51edbb1db212daadfba4d8408773d0b570c 0x1dbf082de90fd7b258a1f4b42e9135252d87367c 0x3c0b46c43190ee798920da9d25cb0b218ade96ed 0x2660c0db6f632a6ae3cd900107df1e036ef78681 0x0451846d9c00788ce2f493515f778c20ce58b7da 0xae60317bfa8a86a667ec4662529cd58a5c4965c9 0x99d139ed793482da1b3891081964fcaf25a05e51 0x4d211d403b706b5fd8ddb15a59a83e78af3d19dc 0xb57d72d038980b601b251b3afb0ae6aae192f9cd 0x65dec1a42bbf7b2a10b81fd1f8ba059c8d2f2042 0xca8bbad6f3164bca79f953d1b41a5516698170bd 0xc557a8d8a19675aebdd1d0b4d7e373216ab117bd 0xd419c0459d50e56f6d7ca6ce2bb398d260ab4c75 0xc725300c68b00f2f142675ad812b2c7d7730fd80 0xc3247d747deaded7dd49aab9fd31178087db5ed5
