ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8D60843120D5
|
Infrastructure Scan
ADDRESS: 0x8d12605c56942bb3043cb568ac35470557100485
DEPLOYED: 2026-05-01 01:18:11
LAST_TX: 2026-05-01 01:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 87 iterations. [TRACE] Debug: 9b91d3a110e123b7. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xecef25532babb6592233c9dabb2140fc6e7eb48a 0x0d7d3c86fbb6fa61c953a5f971c992f96a7a137c 0x363c201a2fc8726ff0b3534fefd4f743e3eb8f5a 0x2c10a64dc6bb37205a98d10e52d3d66f047f0a2a 0xc8e6bbe93bcb3331dd991570db8e4f2cef6aee3a 0x68285e4ca7d234cfc5f48834a4796b705d239dd0 0x4919b6bdc611cc79aecee135c0c5b1d187573532 0x964dd05ce49f147d7ac9fa6bdf7d835d3c6e1d39 0x8b9e4d91d9c26edf09e44ea286642d18a5f74183 0xf1a59afc7e861d7dab32aa5330f9677040b0d56f 0xf42de4d349af2889e281b134b5fb1d10c7a1f93b 0xa60af872b8805c6089d76aaab7c465761e7b4f31 0x99aaf8bdc0c3c4e6d2d78f0f250c3f2661a3e670 0x28de5cc328e3d77da656ff66cd384ce9b5a5703a 0x953427b4a123f4ba13ec4fbbe413f175e72cfd6e 0x5bcfac5619760a871a4ec4e33c92cdf96aa17cbb 0xbbe7219cd515b7fefe2cfd6e3e135782ec186960 0x368a2ed716dabda6654fe6566106a307a759f9eb 0x87ebfe675d8d37f65afb7d76ea40ad7786cae539 0x748ad5f6c1748b4697d027f65db6f0b4744ff087