ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-53213390564F
|
Infrastructure Scan
ADDRESS: 0xe38a79a972b883102cf3934668da5b760b76d990
DEPLOYED: 2026-05-02 14:38:23
LAST_TX: 2026-05-02 16:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 20. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xa680. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 2324… [TRACE] Execution path: 56% coverage. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbfef7ae328be7f773115d838f66d1c5b9bd775cc 0xab239454a7cbcb3e6aa5248d91d50388ee33b90b 0x6013ce737ba33055b92f15fb6d5eea15e64a12d4 0x2c7b1606a35b7e6cac20c5b7e21bfffcbb0f6521 0xd6f8b75dc7546dc47c43421c089075f69dc1fa4b 0xef54049efd4d03ed9f74bbfb1f5908a0b80d74ad 0x078e6c1fd45d1670fff2927ab8734840a0897814 0x0f562048e189766af5304cf1aa34451229e97baa 0x3f9dbbc781737c8a64e08e7f3a6f78e48b9f7bbf 0x4501d676d726a28da3e9ac39ec704c149c03bb4b 0x3ffcab9f8a4ebab776a3878a1393b7d3128bc092 0xab5a2db56e6608de7fe12a447b26d349a10fb037 0xa450e24b2c3b976ec52a6235f4c716d37ff50983 0xbad9680636c0628e9fbdb489a00376c1a2cac338 0xd68832cde2f5d3311b88d224d84d43475bd489e9 0x4a764c7b0e7648614493c68e06f258105897792d 0xb2f7ee055e75c1df3fbea3aedb650d6b67e33beb 0x6579484bab728221c1abeed0e8171d87096951b5 0x514c4d08e1b657f262d37b52c756639bf3059f11 0x066198dbc591e18690fbea97ca59d5d076b70abf