ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6C27612B31DF
|
Infrastructure Scan
ADDRESS: 0x77a7092f8f241c97469ca82374567911a7aac2aa
DEPLOYED: 2026-05-09 20:58:23
LAST_TX: 2026-05-09 21:47:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 3997. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x4021d557 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 93 iterations. [TRACE] Debug: 7b9da0bec1ca2d94. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7c3df7738b2dfd3fe6ee047ab52d29a9e47a528a 0x4bb4718db3ef4c71de8962d8fbef2a5d0b082fdf 0xc0fec5716b6481d0a4002c9784c6b4eb28098877 0x9538f24a3d5c7905b6b51848824135642f507066 0x52390ee2abb5f36ac1a8ea72cb634d6f80d398f0 0x64a8518985b1b91812b85324bb0177f272998192 0xab2379f47fdb1bb489844b8db693006430550b97 0x01853f268b170d4a15d0c3ae905757b5ec8375f3 0xb89320fbb949e504a78137e117b5ff18cef38339 0x661af1138c8a780fa1edc86eca0a02871b1b7fd3 0x846d00788ac90c2b46effee305342e64470cb8cb 0x2bba9bdb0eca17fe98b060f50623a29ed669a4b3 0xf4f74dba118aa076ecae9c42167ce5647f2e7713 0xd5c6c3af38cbd237a871b1e72c55d387739512dc 0x62241693fe1dbef27984884a06620be98677f557 0xe718401703de2117815b85019e0da3545540460c 0x00818ae5552f71bc887170d45160dc707eecebb9 0xca39a4c32d59f04a96816e088fc5d46d35e6f021 0x8cf2466eaf9a884824a3fab7e0857baec346404e 0xa0ee0fbcb85709ca5bc4167049e31d052ce0cc80
