ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D76652572FDA
|
Infrastructure Scan
ADDRESS: 0x8ef699477219710ac4540919a374621f1f855510
DEPLOYED: 2026-05-14 04:42:11
LAST_TX: 2026-05-14 05:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 8.93 bit/byte. [SCAN] Analyzing visibility: 9 public, 1 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-A5CFEFC0.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 3cfec093…6c408b36.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x658cb5d15f271a31d5b9735a6edce1306d1c3ecf 0x3e8823918ec456c99629c8c1d2a0e71432848eda 0x551d20e417232f272ea5fe23702631a174319bfd 0x884e46c8639c8cafcf249e34c22575f4dd09e87d 0x42dca16f9ac34d6e6eae061e8d57f3bc3ba40a2c 0xffb3d2665cba3d0649391f8ceb52ffa2599f4f01 0xb77e0daee60526ac178a9a3f72666ec7654cf642 0x387d46494f6dc5c6b26abc20ae40623ac041dd92 0xe5f33d935520132ef8fb6f5b9a390d0f65c075a5 0x2c904cf2ad71801e25aec7147bb8866bee1069e5 0xb0fea9db6d7123b951e976575a615df33b368880 0xbebeccd35dd93c9639aad47d9ba0596dfdcad7c6 0x09cf3a447292684ba641d9f1d962ffe9b8efef9c 0x481b6b9261562c1998c5e0ad1f1f6811af6b93b3 0x31c6361d0de0e8c8cf279bf0fcb5d4ba7db55512 0x3eec291e553db5c3c79dbc589de32c0941e470d7 0xaa4b046e46216a450f7a2204c7f23f0f301bc495 0x4a7295c45a8546b3fc5df200d741bf6c45fc1337 0x9dae2797b36086690c977930bbb41905dbcf9a6d 0x445818ed5b611c2f4a90c62700bd7482d8061360
