ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-38F97E3881CD
|
Infrastructure Scan
ADDRESS: 0xd451f8065d73bb78d17fa780823d11b256af5911
DEPLOYED: 2026-05-12 03:41:47
LAST_TX: 2026-05-12 05:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x5aec. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 7978… [TRACE] Execution path: 31% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘164B5868’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x19f9fe7cc731080a03b86ad1dcf3357eefb26b84 0xfcf6876b12bcf29698c6117882e49a5f9d568ad5 0x8ea9beafe522a2943fe767e7b38123c4cdbed042 0xe989b6200ec9d8036166a41823c700adcabc66c8 0xe29ef0647b5107ae26f7cde3aafcf729d6ebe4f9 0x50d37e4591cbb18719bfa85e3756cbdd0bb8edaa 0xc19bfc1fa09b0cdd3a34dd6f3a2192895e3602a8 0xac6597860c12cbbbd6fc82c5c5aae06be6f73393 0x92d3f99efc52b2daad2e352302e6740173718b2f 0x38544f21c14620bb48aedda1c8270dac25c906c4 0x88e77a5a802e7908e1c6768d258f0e5c289c2bc8 0x0000000abb106e2cd3870bf439f33528b4f59f08 0xd1345c7b20a9cb54ce24781367f4d3f99efda6fd 0x8f66337a0c2a02202fd91dd596c411cf977c6060 0x429624c9af29266adeb96cc8360200202fb73d58 0xa18610b9c49127e68cac971851cbf729d815b4e7 0xffb3d2665cba3d0649391f8ceb52ffa2599f4f01 0xedb73959be80098efa739a2b0f181e2b8ff74f01 0x3aeb8eadacf37970dad2eeb616f79bafd9103758 0xf72887aa41c3ca9425a2a0a6df6abbb2b4d6a156
/ 6 Visitas
