ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ED7B639A0D17
|
Infrastructure Scan
ADDRESS: 0xc3dcdfb76ee8575e923bef9240cf58a9a7a222e0
DEPLOYED: 2026-04-26 10:28:11
LAST_TX: 2026-04-30 22:04:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘8e273ead35db89645ed59a3fc17b6cf0747240b825baa4abaf8525f880328914’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf2ece37523ff35fa1a848bf8b1ada7e2e809716c 0x44c167c554ed55b68311a9feb64ccd41c9d73d53 0xdb6137e70ca8a0273770a952db416a5c60af9860 0x699ed860a123b52f5b94ed9a7e7df9b66e87d3d7 0xd2fdb241ded34dc63e6783262e7325f4e99a0e1c 0x55cb0741d928bce62c7f70a1b85c4532b0cc1723 0xe3ebaeffacb91cfdb4d1d4f2408ed816c7481f70 0x0d7f240eaeedd42dd80227d6386a873992d6daad 0xddd35f79327133e6289dbecbcad491efbf663374 0x9d4c463fc172f5908e1cf2b8751448d4d74caa9b 0xe7a660dce0694a70ba1e00b571db43a9231a8011 0xd6617dba259a355a2c9c46d8244add236c760a72 0xf21fb495767a4a6468649314cc5af6ef377407cb 0x39b4222cdb464526ee1ccf45a14a74ca77c6ba51 0x6593148b75f8d1df6cec99b45f90dfffc8c6b428 0x215e1bb4b3f3e7d22997b5ea2312e653d31e948a 0x977493d606a24b54f8144f940d04ead6c59c90a3 0x8ad0c4ea6985b2ca9ea80433893e8b1d8dc4fa65 0xd67122537223186303c4835682d92044d8b292b9 0x1ae459b44e34c55927833d7770925475f2a7bcb5