ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40C2B5BF9AF0
|
Infrastructure Scan
ADDRESS: 0x2eb6e69864fead8bad80f4f096cff1b419647de0
DEPLOYED: 2026-04-30 02:16:59
LAST_TX: 2026-04-30 03:44:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x2eb6e69864fead8bad80f4f096cff1b419647de0… [FETCH] Received 69 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 9.34 ETH. [TRACE] Bytecode segment 0x0f analysed. [VALID] Consensus reached on node cluster: 7/10. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x32bee6885efac492c3d92999837e5be25b2413c9 0x3a3bc73d8ffed31835148e1eab0d7d98345362b1 0xbf9ed9009fd581cf5cb151253eb27b66631b0f3d 0x7d4b198dbc3758970604fa0edef825347e9d2537 0x8a94a7029fbce5fcbd7251f72b5995b1078a723f 0x0270dec803fe2bb24492063a8fd1dff4435c7ad4 0x4c0831343c4b387a77824989fc2b7fd534441e9f 0xcd0cfa1680521ab8ddac1a82f033f12a405f1505 0xf264cc8d0008f85a6b1f884fbfc65282ea80d97b 0x02b17c1b70d2eec4a40bdace147edcf1c0764714 0x200f44b4a439becf80dfbfb247b3472d72f954d1 0xaf7ef2dbf82a94317050ddc05d6c0338aff90c82 0x24428f4c0a1fced87e84241f103f4aa4ffad51be 0x19e13903a72299ac76b21025941052f4ac0f4c32 0x2177529e5ad8e27144979c7923bc369f6cdfa2cf 0xc37dc4e973d32e1a0e335cab9a1d6cdbd273e6b6 0x8f573eaf6000e2fdf7f0c0e190e373158b7219ec 0xb1c15c4f24ec3b13634a990499ec057d56607e4f 0xee0bb860b7dbf7f538523d934a59429f86d1be17 0xb1bfeafdefe9a691716103e41e5e2ae1ce0d2b8e
