ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FBBBDA7E8C40
|
Infrastructure Scan
ADDRESS: 0x4e5381a0427b5b0ee4266baba27e1e45d724df5b
DEPLOYED: 2026-05-01 03:48:47
LAST_TX: 2026-05-01 04:47:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 7 public, 9 private methods. [MEM] Stack depth: 6 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x4374d6ad9d84b6bdbf1632e014800f7e2a61d862’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0ca695a12d33fee836f65b12c3633dd84184b89b 0x924e539d82775e54c1916f512fb3bcf33cab6444 0xa7757df3afea8bc6f002f78ae86b1be9a816fbee 0x3041c97e4c086370ecd8d983ea23bf3f3eb0a0cc 0x3a40436e431bf5751af4af701297d320b658f570 0x03193ef8c3f75c22faf2995540602399cdcd4cbc 0xb89955a186e80c60f922d40d050e4535c03b69d7 0x3133eb351bb48ce7f2ef74b19c5ff38f50b5512d 0x8ed676c5adfd6894dd74cc608faeeda8cec55209 0xa4770d897eebf10d374e5817eaabdcf9179e75d1 0x0a8362a715e4260db7937238b9c39aa5ce0e85a0 0x59349e9eb9086024cf689cf69de733a5e1434710 0x8b9bfafeea503a2e103f9160e0b24d555dd443a5 0xc4841e464ecb4152190dbe0c12ebcadacd912708 0x6b3fc4a2faf3e1387c015653515cbbdd946b44da 0x570591b99e51d1b68d5b01691a9e402fa47679d9 0xa56a1aa127a12ae75956865155a044140cecd80d 0x5d71794f6f7b771b6d06ed5ed65b013289bc3ed7 0x17a38c39e02861c6a8facdaec9ac3676d3d9e9b1 0xec0c8748b830cab9c33f48d797205c381370988a