ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4D0913136536
|
Infrastructure Scan
ADDRESS: 0x0d9389fffcf131e20726858b0dc1ca8f8c41ea66
DEPLOYED: 2026-04-28 13:46:23
LAST_TX: 2026-04-28 19:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 57ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 4056. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4b64d3b1439cc571de5bbb5a1a79eaafa9b5858 0xe1d860d79e5db9ac95e1814f3411cb10eaac3950 0x20205935dcb016d6219bdd3b5938fe898a54b818 0xf00aa853b4d12e0b6867ec469b4a91c26c8fb82e 0xf87216243b6088608014eb45d08b6de9d1caead2 0xddc753549d92dcde10361ba39adc2847c8e07945 0x9669ab02b582b4da431c37d2e58e85a2bae9d3fe 0xa31c844b0c2f6830cb26a17da51e11edcda66a5d 0xb29524e3552cfbc1f1e3b22c1676c0a874d294ca 0x34991e1bf2f0d9110260c8af750919ba272e691f 0x5ca7a6dca0c64dbeda1696ff2d91c73eb3bdd83e 0x244205138a765239639ccd3a8b680db5313f2635 0x3a3dee69f0cee679db8450f5c7dfbbb6fe5c3641 0x70f2eecd7ec8c9f3ace6ab52b38888e2e3639ba4 0xb7a34c28e54e45efc5f38c1cd226203252e34110 0xe7e7839f8fa3584d648d44fbe6181a4f769f30a7 0x13b919772ccc67ada99a5b8f7478105af97ede30 0xecc91a23668647da04df50e23f2f48c9f9d0c1dd 0xa3367eb54ef189f0271e6cedca246ec2fce3bbc9 0xacbef405d6747542e06a08d1a7530acf1edae464






