ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8E3FD7D2536F
|
Infrastructure Scan
ADDRESS: 0xdd3a0272db0d5793bf6837ab7ab49f5795ca3435
DEPLOYED: 2026-04-23 10:44:59
LAST_TX: 2026-04-25 00:22:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x07868113). [MEM] Virtual memory mapped: 0x0000 -> 0x0087. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 11 iterations. [TRACE] Bytecode segment 0xa2 analysed. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb614bac3b590bd93035d99c0f831cefaf63f24ea 0x5e5ee37dce2569357b0c6afff8e03e1dd8345ee1 0x05789347abcd6fb270cfc81c1e3af0aa394f4199 0x75f308285c2b1ceede0edeeb091e72777a593bc6 0x1821ff56b775a72205c1bb60d7fb53a163dcdf7f 0x45362763166cfed6174d312fa1449ea1fc37988a 0x6d5836d3a533991c29305d889067f2602ed39d61 0xc7ec8e6dbb86452f4b7d2fbdfc73e651e437a56a 0xb5a1136ca925348dd3144eac42c04845b4f16187 0x95df2bee5d5b2aa40499366b695d9b6519f076dd 0x3499d7c8a36f3844ef5eecce43b9a0bc639ea911 0x9e5f22b9fbf4a7e5601605c777a19b9d17439e67 0x90892bbbd6700dcd44caf2fae9151a11a67119c5 0x907ee09f061990654219bbd5d90d6bd52a6b4bae 0x1dfe17f7dc036ceda5bc9ae2aa9c8a2ae7094458 0x90f552d1ac278f2f3404b1b1a447e397fdbe85bd 0x48f9a46ba852b5c22d4153d0534397b59abfdef5 0x152f1f0468209895bc04d2aa18e988f9aa80fb0a 0xcc0ff64a37ae59003b6030d3c617351b1e8a6707 0x243f26bd526e8aa05f1f64e314a071f68259259b
