ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-874E8E7F8767
|
Infrastructure Scan
ADDRESS: 0x180837a68bbe6afc17511d03970479504faf05bb
DEPLOYED: 2026-05-01 10:55:11
LAST_TX: 2026-05-04 22:08:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 26. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 6 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 22. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. $line = str_replace(‘F0CA9841’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x68059bebc2cf7db17118a1b1d1bd56d3dd95ef72 0x614e546726cd026f73c40902e0cf73d26a2a4f34 0x8f88c5fbb2898ecf6299a846ff6e70b411d00d9d 0x7b5258637b5e7f3e9c1a069b017d3d31125522ce 0x04feedf0a09177ca43d10c4f309149e5524d8294 0xf2f73cc7aca1a2614edc8b5cf7037d6878322e8a 0xb95aea1dd5917c7436c290ecb6893c541a9b7d0b 0x981be8315a127b63178cd248a340aea5b101505e 0xa7aca7c0316b7a10ab994e72d729b2c0cfac9979 0xa4e58c64ece6570b5e7f113444590c3c23cd0dc5 0xccbf2d03885ef3ea18be634ddf07bbbd3fc550c6 0xa068d217764d27953f05ae330934e92dc47e773b 0xf3fca6c894a76e8eba4e5a9c28298b8ecab811b0 0x3ce97093ac5fa78b4733850699152288427c6b9e 0x67572f5841f9a0b8a13cf519fe01e39a5b3a29e7 0xe6aa688752c903751b84064a12d7a51cbb0fe560 0xbac7e9f0267ede9ae9c49ac6d2a238ecfde49be5 0x4de8f624030a8725a47341c9b5ffbf50738b78fd 0x823f6858d76139fef9cfa15261ab0ad6422dcc94 0x6969d5e01bd55b26bf40c23827d4daa40efd6969

