ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9CA434C95BEB
|
Infrastructure Scan
ADDRESS: 0xdc2543ac36e6a7ba948d44a185cacc1f539dc116
DEPLOYED: 2026-05-14 23:21:59
LAST_TX: 2026-05-15 23:20:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x60406f48 successful. [FETCH] Metadata hash (IPFS): 1e585f25…1075c54f… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.25ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 41. [SIM] Mocking MSG.SENDER as 0x3a2fd6185506281e10c25f27fbfddc4bb2d05d68. [TRACE] Execution path: 68% coverage. [VALID] Finalizing audit report for 0xdc2543ac36e6a7ba948d44a185cacc1f539dc116. [DONE] Log signature: cef8aa1618cbdf394b44be3aa4d36017951408d9750f61eb8d4d195870dfd66c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x71db0ae3115483eb9b17873fadacebe58d4251ec 0x3c4b06ad5e2987c06df452d43c17f5628d8ff070 0xd6673db35e0e3b4a09e8db7c5aed6aee22fe5d7c 0xeaebb2e26be7c81f7ee2a304a4b3a4ed8ca9135c 0xaa38bb9d3795980f1ebd2868ee7b233682b012e9 0x18a62a1b492b4dd6656e6f6db42daf51444ad2e2 0x0f7b166bc940757fe881a493514b976ae96ca02d 0x4ab1394dd96c91ec604e5eb7faac7c2d53fe142a 0xac7e76692f86e1f36fb4d3c933ad2ace67ec1bed 0xb160231265e4994e41bfd464a5e8a8be28823203 0x222685813b2718c7d1007e20864dee7d32895caa 0x2531ab2eaf4af95590b318dfc5ea99f3505e2a9e 0xc2cea51864b3c25ae6c09e9d6b31294374c186c2 0x8a418039b1945a0d9003b2b568a37cfcc5867b39 0x55f7cb9e8ab307f1fef840cd4719271af15c3fa8 0x964fbd0e220c691e14994875be2034d8a2fe7d2c 0x560d98f9ef32f843fddde7736c54d0a83a39ad88 0x0b01be9d24cc8dd0b70d82d3e8bb743ffaf98562 0xb0ffa2477414e4902133eef15f42a5018d873c82 0x247beba488d82d1f6f8fd0323bf12191772159f9