ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ECA0DA126CCD
|
Infrastructure Scan
ADDRESS: 0xf967a97820f6ef8edef5487758e5b1d46a348092
DEPLOYED: 2026-05-15 10:58:47
LAST_TX: 2026-05-15 11:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x18c344c1 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.76ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 88% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘14015ca2…ca81c45b’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb77e0daee60526ac178a9a3f72666ec7654cf642 0xcf22e68f4e8be3844249d63f6939633986cad39e 0x63b3ad9946d6180d02740d11bba4b8827b63d8e3 0x55d7baae6e5ef17c6bb477de5dadff020f9fbb2d 0xb576ca3029c8a74fb3fbb7e333c2a044d1fad304 0x9c9a52514e7faef2d1ce35c241d5da40d33f034e 0x3a801607823ab7606937eea439dfb32024509a39 0x81a2c59adc498c580f6035d62c01ce572f19eaa3 0xc828d27ffd2073e2f410cd0516e5536ceca98ce8 0xb5851358957ad3b0ac5e1f2d552b1073130cf4e8 0xf3d5bc88e8ab6c0df928ac5bd7ddb38339032035 0x9334cec3b718d282d7ca67f245642526e8f25328 0x7dd7c9094113850de054598c8a408001d93e403a 0xe758fb9cfbc4209e84552673fcf3b412b933c094 0xf4d1bbad1604d3721575a6c85ec728f591c652a5 0x42e323a93100776e0b000574b9e4dd24a151e3c9 0xe9438e8a75e62c676e18c7fe486caa432e10d9e4 0xccb7b937479a8ec8d74f5b46cf16b3ca47cbc0fa 0x296b121d2dce5720b4a03551b887518fdb6dbb10 0x8e3e7d0dfe219af4f388fcb3ce1cf8bd527ee3cd
