ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1EA832887C1E
|
Infrastructure Scan
ADDRESS: 0xe9a859bb6e239fb53048017a093844a01ec58750
DEPLOYED: 2026-05-02 17:11:59
LAST_TX: 2026-05-02 17:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 94386. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x8f2e. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x81 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 67278cd16731d79b4816bd0164b680b50b86046bb5d7f419022184f3d224366d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90f9fe04a91206b8ea1c277be63e30d710bfb1f8 0x132e39a5751748419c26ccddbd9020057a1684f3 0x93bc37e8b46e26d8935d57fb1698fdd32da592c7 0x4e644dff647da635364f8fdb81adca0286905492 0x295af9431ade8f1a7065b6865db0859d4d16c62e 0x5f23e9f6b7464c5c923334c8c01187fca57bb4ba 0xf6c29a790c82a147e6ae12268ec0124b2382b43c 0x0447a9948bcd5446191d0333556d23504c04c98c 0x84bd11796ccf738490ce57ea5cf3ec6a29c8959d 0xf0103119539bb3175b99c55fa6ce02973a1bb076 0xec6d3b7b3f4ddc073a0051da40034512c83bbaba 0xec3107be473982de0c89f5267bd7356016a4b5ab 0xfe67a4c304894922d90f69dbfb1be32bc1b689af 0x271c9df74a615a44d046a57e50286ac7be60d00b 0xdffa3bf9df30ddcd2cacf616af18c7bc013af6f6 0x8951e6b2e0a513846878cf0f0581d8ae80165e49 0x263800086cc73cf3113f5077adcfdc6bef1c741a 0x60217384197405fb4f02f360a442cab48dce26bb 0x9604f1b64b4db29d951d945774b6b46ccc1b2e25 0x869a42368fdce84baa9ebfc936869d258d607f3f
