ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B818A6D89F43
|
Infrastructure Scan
ADDRESS: 0xf35feefc8337f11d77360938bba888c526149507
DEPLOYED: 2026-05-15 04:41:59
LAST_TX: 2026-05-16 21:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 2936. [FETCH] Metadata hash (IPFS): 5b673b38…5b544b79… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x6c. [TRACE] Return data: 0x1f9e876d… [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9a8f4258a102a7577379581b2ac7a6b650ee12f6 0xabce90acdc9f3a6d42dd6f2c95190eb5aeaae742 0x241d68abd544d025a4d5f4f81833bee788bdfa72 0x4d29854325667a7cc2276670d17910ba958320b6 0x9f10ab46e89ac6d0259d213d7616f6b7f28c7d33 0x738fab1ec99dcc29491e523324d009cec1945c86 0x3fa1d6d5fd6678b18cf6904a7e54c2d4cec5ca31 0x368279d019e4cfa1a2a1ef3f8e61c169bf7adb2c 0x23667aba02caafba3fec7a13faa0fb10939a2054 0x688228deb221b98de330881cd84e1fb245c6a893 0x218b4cf403eb7b04e7a28d4af97a3e1a4904268a 0x4a9ffb29c9113e3c390c496fa923fa900aed078d 0x1b28e09321a0cc059cad2e833b81895bcb1e2a66 0x158eadc087ee0050cc838cb541fa60c4d2d84d3e 0x3611cf3538861fefe866c2bca730a93f72120bd9 0xefe912dc9850fb79f08731f8970dec506714512d 0xa12248e95ffe855633be780081f73b1ebe17741e 0xe56e768360df50d6c5759a6f7f87fb8a112c6674 0x09e10ba07d7d201e78b4dad0178ef08502515ada 0x05e8813a69949f6c3d8e8eed20a7306e3a01014f