ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-57F5B10A6959
|
Infrastructure Scan
ADDRESS: 0xacd9234e1136f40563d4fc37ba392dea93368e45
DEPLOYED: 2026-04-29 06:38:47
LAST_TX: 2026-04-29 07:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 7 public, 4 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcf47f0483981806fff1154d9dc777f1846431166 0xfc2a2b57dedae735eae526fb671724e5f8cd956b 0xb3f8c6d7d83da78828d561d5b26c1a1ca09ff257 0xd676c55b401ca1de380b0b359014bb56404724cb 0x59c0f9029592e6313192d9995d4b9fbf4546caac 0xad5bb9d57bd1c244107a4548901c37518280e3eb 0xd741d242f7791dadfaee4709aa33824624479f56 0xe8932ca764298ecc3cd8f3763a5317d2cb850504 0xf3988c2631f2d55e15465d1af9ddee464f08cc17 0xb1b5a1be623703bb2265c433a2467c6e8ca02f0e 0xbde1ddeb54bddab2f806e32bde62dc1f04de7cd1 0x4501d676d726a28da3e9ac39ec704c149c03bb4b 0xfbba4b8424c851fa4fba34ba08263509baa627d4 0xa82b910cc284e7507314ad9c29dfa770a1d44dea 0xded4087a938db09b7405edfcd02810df4b593613 0x718d4e5dbd5f6d654e3f1de0943e124d9d630f09 0x169f8aab4e24b078cdfb3177152c240db0cd6e62 0x3e680373ea0f58df8f030064b7500c0293057610 0x8667ae7bc2aa346a4027eb4ce635cae54118de54 0x6d51a467b3533d27e302c7660482078ae211ce29
