ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-239B33CBCC41
|
Infrastructure Scan
ADDRESS: 0x89b6b0ed44a67c9f0be6584d86eb323d5a909020
DEPLOYED: 2026-04-29 00:01:35
LAST_TX: 2026-04-30 16:44:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 39ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 18. [SIM] Reverting transaction at PC: 4719… [TRACE] Stack trace saved to /logs/TRD-D987BAEC.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘984ed28e…d8e6dbe6’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6fedf57e27f9e6eb998a9239b5db5cb6a5ca3cc4 0x321e677e4cb772094f69acb9e0b56baf4b4f5068 0xadf2bd397679552f471083c479b613164588e077 0x2c49f101be7c590ecdc72f98307afa90a945d1a7 0xd392f4d69928749d7eeb11eb6b1a57a911c583fa 0x2934bf558ee3af160a372673e0bce51844da5d13 0x0846d51f36716d1c004833e3dd2525ec9282abfd 0x26e05b5ddeeb221ee3cfb723cfb124ea8891302f 0xed5d09e37fc21921fd29a01371aeb65f78300504 0x9ae484f3ccff1abca8ae7b6f8e45c5283028d9b6 0x40dfe8a2c8b95746b1f36f921fb4e812a1a6725a 0x136774732363deaebab0ed39fb9010b1d023243f 0xc9d65af484032bae3dc8d44e5247b3fea98cf0d4 0x3b32dd6b9eda81ec8cd32d59947e4079cd3c1d2f 0x240970848da0a974db149962cf50aa7d1cc64c0a 0xd167064730dc0bba0ba28385cddd7cf345b5e27c 0x09e71dac9bd4c3aba6d28ba67d9ddd6e8926cc9f 0x96ee649d2f90c1a0b66120aecc588506839793ef 0xf6d3c2bb9f7ff4657ab801e187eadbd08de57202 0xfb0e7aef0684d2ecee6c5ab4ad3c8065313441d3