ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-06F3742AE6F6
|
Infrastructure Scan
ADDRESS: 0x7f9a926b86042c9c2edfb1b6dd04ed03a65aa088
DEPLOYED: 2026-04-24 18:23:11
LAST_TX: 2026-04-24 22:24:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 52150. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x6e7012ff84aad0f48ab2e7fe08c3d27859f9e5ca. [TRACE] Debug: f898ae02932e7ede. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x6e7012ff84aad0f48ab2e7fe08c3d27859f9e5ca’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x334019b8c5c904fd65487b1aa994e0d2f7407543 0x6deb7d41f1e72b6b10f30c47ca8a640bc22f4481 0x4600583c994390d1473fe0320678dc9d3fe17ba5 0xdaf7cb1cec3b73d6e2a8dc7d4ad8212288ea7b2d 0xb2ce3e1ffff09967bf19cc10b37397fd4e659c89 0x509ef7ffc39c63c3e4f6d1b04c28f2ae44256a0a 0x44f8860e5ef4d1a853318c49be5e70c51909dbd8 0x91e923fcb63c5b4bdf47e76c60c15e7571e10ac8 0xc8a2cf94a80bda39442590d70eeaed5414eccc73 0xfedb6e4e328ef59534d3071e37bda1f8894eb2e2 0x38dbe9cdbe235600c9c2d59017f7dc054ab32e5c 0xf4653ebbeb0b4590553e44480397ce23f585e17d 0x85e4bc299c101cd03e816b00ba605174ed25abe9 0x75fdf9eb3e93a7853bd7aed2251cfb1ff8751a9c 0x60d51c492a8bd3de27ac236ce0a68e6603f46d1c 0x02546738f9115195dbcf9c012723457b162ff6f3 0x098d8644e40f060ce0a09edd888a39901e6babbb 0x05adc983e771f0a535cb271e84049bba71e5c924 0x7b96dec1ab78ae8688879f7ddd1c3f2cc3019bcd 0x2b4aea111377d6537b9e3c17f277088d1569e7fd
