ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4D0913136536
|
Infrastructure Scan
ADDRESS: 0x0d9389fffcf131e20726858b0dc1ca8f8c41ea66
DEPLOYED: 2026-04-28 13:46:23
LAST_TX: 2026-04-28 19:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 57ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 4056. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2821ccc2beb73aff1b21e85f3adaa2ffc24629c2 0xe5ba854b91b6c607eb43d8d9c129566cdb4ffc17 0x761dc4a446482d261b8b14cb2f1b9f78d7f966ae 0x140d06e0e031995b842c0c14b21d9ae8bb035577 0x0a0eba728c6d02c175cd6a5ed63068b2e0f6730a 0xc10d726c4d52e8ca87c466fac0e25cf70f6c770b 0x79b7a1a660c33b5ec954e3b9949976fb213c9736 0xbf9a8d85cc12ec5ddfbacc63c232a6ba4fbc6ae5 0x1eeaa29d865f91762064597e1311ca823f1e1b2f 0x52af8cc36db1cd84e0b6dc10246aedfca3a59c58 0xcad5488a8e9836d74318b7ba1cf9d5b2954730f6 0xe9f4d11508bc3d3050071457fa707650d120a47e 0xa79b03120f3f6bd47877afcbe6786336a823cb83 0x8c3ac67e2e41d082f0c0aec87a629584468a0320 0xc9e110f9439d78a6ff3ad03fc3f103bd5fdcb3e3 0x01e045e2fc3c24317d6d12c6bed6eaa2ab0c6d1a 0x3b1d185c8f59f159dbebff5bf1ec18580c7eab33 0xa886e70bd15e90e2fd36abdb9b54d014bc97fa12 0x46ad1992a3447b3083d79b45b18bc62987a74c40 0x835bca7aac7633c5465a0ff8b0f6ba8f8ff45b66






