ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-130438E0C00E
|
Infrastructure Scan
ADDRESS: 0xe74f402a589f6d4795be1f4e9c3603ccaef12d8d
DEPLOYED: 2026-05-05 17:46:59
LAST_TX: 2026-05-05 18:09:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x40. [TRACE] Execution path: 43% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a0cdd0ed6d9c486bec0abbe169b6a13a5b4986d 0x4aa826c16d7b6099db42df60d0fe726f2258deac 0xc12c6731f37aab555f78a5327f9625524bbcaf02 0x7baf857f935828d385c3d1e74fd02dffeb3cb1bf 0x1a3535159a8572b4e1d74b7014c2c9eaf167add8 0x8f6ec479806d543c2810f3d6871266a1daca49ba 0x7ee4984604b19017bebfb37a0eeb0d32104da6af 0xc61f2c70c840c3033a814dc30fc73a0337a2c35c 0xa0ad0e65b69fea7958c74bff624d0e1221ba81b0 0x8a1cfcc32084b4fc3eff70fabe8286ad7e56a5fe 0x6d500e84d03479ea76a2dd2db4ad0b41fa8f67d3 0x48b0f4c75ebc67969f95ed922eb6017fadab3b8e 0x4c3bdfe02d623183bed5c7c3d3e66e6e7cdab182 0x134caf73f5d0a01961a08b83a6b8817a0ce34d22 0x2f2950e73d8478cb289f968b5cb015c82f280de5 0x8bdc359f2dbafb5afe7de6293f2dceb35d096a2f 0x0c08c707c9aa2968f72002126046d4d4bfdbdb9b 0x8a514b758bff20db8b61e7665e31cb3202550547 0x9a1188e781099342e6eff24314f924557ff3f8c8 0xa81cba338c0bb0385be8b6ab170f647eca2df753
