ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E0761B4AB81
|
Infrastructure Scan
ADDRESS: 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09
DEPLOYED: 2026-05-03 14:33:47
LAST_TX: 2026-05-07 03:35:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 48. [SIM] Reverting transaction at PC: 8574… [TRACE] Return data: 0x506c1cb9… [VALID] Finalizing audit report for 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09. $line = str_replace(‘bfe5d2af…6ce64a21’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee98d3cfa5d183ddfb01e91ce4224a1291817055 0x9ea974d3774eef64c06e47d45671ce6d7167000d 0xd7074e0cbea66f7fbe26b3e65a04d92771cd6cc8 0x76996d5db37203dead157cf42bb32455d47231da 0x195bb8e6fe3a7583ae30f6393ed7420ee7bd38dd 0xc70097f3bd9a8eb8cf3a4f67810ce90db6d78641 0x52a54b60d0c6468927992e698e17527c3845b5ed 0xae66385dbfdee0caa6bb6d70151bc3165b5e56be 0xcc8a3570e920ccb0da12075c5f2e779d4c62969b 0xcf50361bc11ccd30fe7253e216c417cda378ae9b 0x118af75174dd16245f2a37dc760b7ec4eae9757a 0x696e7b1d5d11e2cf7f7b970acf54cf1491f17a47 0xdfa689eab6bb4a2eb066d1031bff058a185a13a1 0xac62ebb7d4c18de46cc9e64efacda61246fe87c3 0xc51a1e79772df40f1e02487515e04d6b49e20f23 0xdd7aa485b8d1456b6e40b5c644fbd482cc06ecb1 0xebd023ec21a4a9681ad65cd40ffe2b7336d7221c 0xbadeb510477d2dbd589570ea591546d372f810b2 0x2496a80b6d8414ba2d6c723cd8944a89bdbcfa71 0x3edf9c76d196e36526c22c5b06c950b9a122128e
