ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A68AD310C8A3
|
Infrastructure Scan
ADDRESS: 0xb4ffbcce990a9a0b5f84722ba2d5db4e7bfc9d11
DEPLOYED: 2026-05-07 12:19:23
LAST_TX: 2026-05-07 20:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x97fedf32). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 74683 units. Result: SUCCESS. [TRACE] Execution path: 37% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf2f73cc7aca1a2614edc8b5cf7037d6878322e8a 0x7af408e332e717ee68e96eb78b6fc0af854b5e09 0x88e0652510c1e3ca4ad7de05042810a522fcdbb2 0xa816df9fee674a48d6b74448681d2b573df50587 0xf8839937a1e36fe32f64ae2cd83e9c56bb21f9be 0xb8996a2571df7ac3fae1ea844820bd8010ff73a2 0x1a09552187e539c052e8fcde3e24c7d9e895fec0 0x654ce74b131c969656374e9f863931b155e17a4a 0x7e83d660c4407fde5cfda0a749571685c8463393 0xc9eca9cfb8eea7375d1bf1d0ab0443cf5914243a 0x9b41b5183da0fd8f700482ef94089d0cbabdd0a6 0x526c4dc5a02d6de736299b0e985756f02f1040de 0xaedf59ebaf7789fce314e1cb752cd4aeb337fa1d 0xfc3883246c26c68b7e990c06340a80f50e555b7b 0x7d9dd0187583f60bf2d311abeec3159d31f66896 0xba4239f8d174fe37e7e329adfd5504a9a9b73f21 0x652f3847c84651c2ac6850444686669e7b90cd04 0x2de606f9753291c76e4e5eb0c829f35dbec12309 0xcd017d0ae7936e43d68528287e1e7c5df7e12e86 0x4f443ca1ced2a5798f1904b1a3751d3b0e15720f