ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-33F1B09A221B
|
Infrastructure Scan
ADDRESS: 0x03ed1b9df9bb8936db76cabf0742c33c0df7ccd7
DEPLOYED: 2026-05-02 22:33:11
LAST_TX: 2026-05-02 22:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 2569 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x516c3898 in memory heap. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x9f. [TRACE] Execution path: 52% coverage. [VALID] Finalizing audit report for 0x03ed1b9df9bb8936db76cabf0742c33c0df7ccd7. [DONE] Scan task EE3CFF7E finished in 51s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef22d18b0f32a9c44811eec324369cf697e457aa 0xe2f17b9837d9505e98d4f95de7b9c942dc765d07 0xddb07d8946fcc61c7f1c16c04843b1f41d795918 0x041ea746cdc9dd87aa6a3ad4d29859b8c4c11cec 0xd045a789997069d60cb7e05b53d06324218ec36d 0xd95fc5a5d76c3cd83ad174a61e3da58b6c91a44c 0xd3c2bc41d6467d389d81a09070b13f1856d91cce 0x4de74c7c2493da04509340dcb1d445fc790dfa42 0xf70d2ed6b8e1148ef2934d91ef15724e1ff97e16 0x01684b0c6215fb4127fb8fc272b9272efb171f47 0x10a5144d78164358f4fec1ab7ce5a4a05373e662 0xc73c45b17a8020d0d2428eb047407e521afb98ce 0xe35f0b0723c16a1909141c96dabb6903a424c2f1 0x31ec0cdca2e9a2bb4360d101f250b4a4bd0f799c 0x092267a86cc4d0fbef351dab5283532ffd8a45ac 0xe1a18c02beb8a20488d645f12c074a6e068bcfe6 0x27ac406d4656e73833348cea669001d19fc23f18 0x4249b9aace1a4547f483f88f74e04d950b7bfa91 0x22c0033d4862a0f8f65e2174a281adbef58890a8 0x1561ce12d07ba087f9a2479e333fc0c9f592448c
