ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E28419E314C
|
Infrastructure Scan
ADDRESS: 0x50f6875f0bbb63635b44ec0faff69ffbb2b9e64a
DEPLOYED: 2026-05-11 23:39:23
LAST_TX: 2026-05-12 00:06:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 19. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 54 iterations. [TRACE] Program Counter (PC) synchronized at 5827. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc4705828271cefebbdf3895b8bdcbf742a39e23 0xcc9a0ef92b3d5ee1e072716d234707ca274771e4 0x1370c26c44d38ba4616cc88f4019aee18d2635a6 0x1e5c8e755aa14901251469009510fd243b02e6c3 0xabf3bf12d411811b9c7a9abbde4a997088e0b2dd 0x3b47fc9d7a0f1d78f274624327859b55ea22bbc7 0x87603a623723b40bf6f41ba67b5fd7754ae6a995 0xa247668384f06caac728c47111985a904f743310 0x306b877953eaf359265c98a6040abee7ea34c040 0xc1f1d1853afb2e537636adbb173b1cdca40cb9ee 0x5cdc4e325cef5c088ea164efd66e73e7b0ac86b5 0xc2af1a14c4a043fbaa76262ca98c6e1ccdc31685 0x280a1718bfe84f97a6587afabc45e2a802da5fbb 0x76ade5cfe7c3f24d4f49613606e8148e94bf6812 0x99204edd757628445012ac042fa118189e049c4b 0x8301884aa8fa50a5c0b92f9da7ca623ea5716747 0xc1741eb0a6d4eb871665ac7a3b78bb65c6f0153b 0x0726699b6fc93d9290c96313703116b0ef2d3074 0xf8df9396d5b41ea3119a358f6d9532cdd79bf0e1 0x424b1f9d87512c8cdbffa782988ddddbce73c8dd
