ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C24D8CED9161
|
Infrastructure Scan
ADDRESS: 0x2ed526b627240971ebf316d60268c0dec824e354
DEPLOYED: 2026-04-28 17:36:11
LAST_TX: 2026-05-03 14:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xb1dcfe4c successful. [FETCH] Metadata hash (IPFS): 3a11301f…11392cc2… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 4 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 90 iterations. [TRACE] Execution path: 95% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9b14b66e1d4995cc1df547aca7b7563316ec7588 0x085558bd42ff2c8e2084c29f68801124a665388b 0xc892a54180b995507ca80b952e0e4071a26e6395 0x0f69e664c9edfc833da40e3960d8dcf1ed8dff66 0x1afc28694055efe4e1d5b4b0b042fb0f81d80edd 0x7990716a303f1dfa272205c92266b4d0dc6e2c70 0x35be865e5d67679da8be0fea54d7e1b794ad51d1 0x92773eac2b2649a003269e00ad6f91c9e4773ba3 0xa80030fd4f962781e52231db4459a3bc5604131e 0xbe33fa6eb0b33984bcd88bb573142c6542b98607 0xf403a028be2dffbfd616ced00a0fe1d4021c0bae 0x391b5a63a36de09440886e5caa3e7bd05ed88d9c 0xe44dcf74ab26ec2e23c4f0922dcb9765379f0aae 0x83667ec32ca29f0b2769202e67a7f0c0504e5927 0x3a8f33e7982b8761a6023ae9a9c53e7cccc1c872 0x8314208ee429f5664c92a09c098416d0ed77cdce 0x182779f2ebb6cd934ed21beca943a46f0674444c 0xbd66de0f186146982ba7edf1a482503979a1c9de 0x22e3a2d38ed0912188aba8e393f44661c39a4d3b 0xef22d18b0f32a9c44811eec324369cf697e457aa