ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A3D5B532B45
|
Infrastructure Scan
ADDRESS: 0xca6d487a5cbe458b88f52291ee76c26b3aad2845
DEPLOYED: 2026-04-20 15:42:23
LAST_TX: 2026-04-25 11:30:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 64262. [FETCH] Hex dump completed. Entropy: 6.46 bit/byte. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x60c6a80f in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x2412e6997d4e12164b122ed413d7c942afe80ae3. [TRACE] Bytecode segment 0x48 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x2412e6997d4e12164b122ed413d7c942afe80ae3’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0cd322db7927bdd3f6a5b85ca1b7434b99dde60f 0x1fd9e9b23d64a91310f9fc81acf3854e34580e8e 0x9c4c3202d6518dadbc6a7b973646c22a24a06d55 0x0e54a31b08eb17d5feeec4f4ca2551b3567d4aa6 0xd326fee925ee87bc33aa2adfa661cb116a609d03 0xc9c7e03b316372e852ef79ff7be1d8fe001723f9 0x10adf350b48c06f36b6f3bd8d40ccd3f51d0f585 0xfe8f9c4b24bbd0ce74cee60f5d8b44f616f748d4 0x3587e7c625fc451e1d324eddb2cb9431ef793492 0x99410fffe29980b3330045944acd8978f6630d44 0xf8589ae0df50709b35d527c746a763deb23af8b0 0xcf1fa90b1dc2a0feaf0a57dd4c9753b4d7caa5b5 0x0f0e1ad15cce0fbde92fb2a5a6bb129355efe98d 0xc7a15f757b570d3ca52b15203fdf6cf2157f4445 0xfbdd5e4b397173ff8be6fd21bda23539620909fb 0x0049cc84c287e240d659512ec9b34134958c8727 0x5e72213dc0168afedc01a12c721bce05dac4739e 0xd95a0f878d3a759d385c9cf5217b0dcb51dd27c2 0xa0a03163561c8177b676283693f802bae6ad5730 0xae920767f3232009f3d35c11341e8c24afeb3a68