ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6F1B2DB1D300
|
Infrastructure Scan
ADDRESS: 0xf43939a579b41e89df4a1b1a713867621f08fc21
DEPLOYED: 2026-05-13 14:43:35
LAST_TX: 2026-05-13 16:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xf43939a579b41e89df4a1b1a713867621f08fc21… [FETCH] Metadata hash (IPFS): 40e5e9a9…440e5f99… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x4a3a. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4ae596b214431d30c1ded1704323c18cddff0fd 0x339de160163594783bff50695a11ce63bf77f32e 0x31e35c8202872002c80b5555f39dafda41bc0c9c 0xe3b839928eff485175e1addcecbb8642dd7cb982 0x0b8f853c3e754ba35776e673f1c896af1b71b3db 0x62ba04fdadfa64314ef829a67cbf62c9b74d71f4 0x29fc224d8ef71dc81761b907ab7e7816c38eb69e 0xe7cf6a7fe834ad68ee5d0c82a50b717bef63ee73 0x5c27a296f265aa91da30b7d42eeb0fc98da92b38 0x589704dd447fffa95bdf4a3c8571283976a0d8fd 0x1027c6b663d1ec6857b8b64582dca382a98d0049 0x1fc7d9eda0256fba8e25f3f9c07aaad7fa5cb4b8 0x6ee8eb6b4ade1e6410226fd5c218f2d95e1a5ac2 0xe04a7acebb332f09139b5145588114ceb97d7739 0x25ff290edb1c1837cde76a8db99f62be6e7d9aa9 0x273d43bf20cdcf472e035b6a68a61e26510c8c35 0x21acb73b553d4e23a793e946fca0490cba65e853 0xafd5c07de1256f108718a75e26611645e63f4585 0x09703ef11f6db2794bf72e4017fdf5b4c42a53b0 0x5c6503f285b41f2ab256977443cd289e5d4aa405
