ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-43E66886EA6E
|
Infrastructure Scan
ADDRESS: 0x0d4a7679656f619f363344407fcea2d92ccab88b
DEPLOYED: 2026-04-29 03:30:11
LAST_TX: 2026-04-29 18:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 8 public, 2 private methods. [MEM] Garbage collector: 0.76ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 2331… [TRACE] Program Counter (PC) synchronized at 5845. [VALID] No critical memory leaks during simulation. [DONE] Log signature: cd1b308f5a251e5c754c0f9f30e39416b7cfc90047f1dd54fbfc4785dfb4b8f6.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x22f05515497ce8d78f3898088c474403ac9c668f 0x13e2393958d7d3ded9d3daff8734d9e8ab695839 0x144e805a4fdc5b4d20fa26083c127b3786a2883e 0xe5291b2863301d6fce15d6ef4a9d159927410a9b 0xad56852477853a402b84a9cf19e364fdccec412c 0x0c87881fdb744fc7382520c7567cd6c94d9ef017 0xd81f324108088850c71441ab208701b4ffaad13c 0xfba60e668e75ddc3acac2d3d9279b4d35e9fe460 0x10f6a376880ea6c91a47a1682a443a40c08118d1 0xfd1ccb7a99e4634d171d1e9a2ce75ec759042ef3 0x74483e7ffb4ba8c36250471e61a1f989e04deefe 0x4dd39d3433ab7759aa62828a3e1ca29bdd3481d1 0xca1a7681347043ad3d9db4dd19809af3bc7f1eaf 0xcefe19fb9a7e7f5a24a4bacd23df0120b80f1934 0xc801071c8760c464c38bc316b22d5c2a44af01b2 0x4234082ad0287bd41683a28f5b2c5ed017b07214 0xfd4bc487aa11d7c0f32d5449c5dda57018ae09dd 0xe61e43b016cf874b935681b103eaf3e5d32db297 0x05fffbf834b4af3a3c0d1f88b5fbd11ba6843a0a 0xcca1acbb82367ac1ce8ab5ebda8f6be8329ff02a
