ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-636D9E0E0D83
|
Infrastructure Scan
ADDRESS: 0x69ecabb1f5e6c245d93f27ee64c4a7e36d7c859e
DEPLOYED: 2026-05-11 20:37:59
LAST_TX: 2026-05-12 18:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x24c3. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 21 iterations. [TRACE] Stack trace saved to /logs/TRD-8C243691.log. [VALID] Finalizing audit report for 0x69ecabb1f5e6c245d93f27ee64c4a7e36d7c859e. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5281a885998c203ddc82f57a6b853b29843b6b12 0x5c3825e779afa623e136a88a4a1a310db88a874a 0xa6f5f50ab793e502760e0feb949b3d38a675796d 0x2af2dbe7a0fdead94834cb23c5edf1e235a235ae 0x7ebd7fb5b7a999357483febc188ab74c2ff75de4 0x1c1fd417e8f7c22483e731bb332063bdd71f75fe 0x1b856e0802845b72c8367e4e3e70fd41a159fc9f 0xdc906ab77a27cb663356cf6d03fb708fc043866b 0xa56a8af5fd7e68d80734a20a49c8e16dfca96f42 0xb32fcbcfb65b9208c5030311fe5f88e2e2408294 0x324bedf0fe73a441b0b36e939526690526bd564c 0x98cf9950bf3b06f7c63f56bd9ed8a0f5feada1f3 0xe5376cdf7ac706cfcbd09a272ae7ae2edca6ed7b 0xa5dbad78a2a16cb1f09d026a9ea8d0851a7304c3 0x1601517512d9c1c045ae02941af10721ee9c483c 0x5e8081ad9f2e34b58480e6df7736f8f136ebfa13 0x968a8c09f65c0dd66d2d43d279efdbf02d14e35a 0x25b94d482e90e233d37e5375875a75e237bf1ca8 0x62cabab3b35b313b28f0508bc886787efd6a5795 0xded6c21badaf16ac0da840bfea152444ab954b33
Leave a Reply