ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-226660662C5F
|
Infrastructure Scan
ADDRESS: 0x8b60ae733369e13e24b907b010cc23a8575202b2
DEPLOYED: 2026-05-13 05:15:11
LAST_TX: 2026-05-13 10:19:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xf054e4ff successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x70b261e6 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 29% coverage. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘474b17ab82c3f76a9f497c95f5de94562b334f2e006ebd786182568d277c2fe9’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x92649cdb38138e0a46ffc4256b135eb5d88cc5c4 0x66a37538432671434fc701983107a4d00a486017 0x31b26b76a215f63c9a7f6acb8e8a6b56d255e543 0xb36a046276dadfa35dcbea005e3f8ea1f6f50519 0x863974c7182733e34f78fdd0604a9f3ccbfc5fb5 0xac911811595fbd5f8c115086042b446decff8b01 0x3f0e7b04d117351f828f4bd783d65f258ba54902 0x8063f6e1d454a6c715f925ffd0e036928c1fa7c6 0xec1e9fa291584e486f2cd2be92a06976d52b4450 0x1d74f13733bc75d935298c0e5073586b2e857396 0x64b87331ca9be72cd75525a6b73107123aecac86 0x72277ca6bf6d0b8163875226252507f92b717ade 0xa01a0ca960e41dc2642543e9e9b10f2cdb0bd417 0x19701d5bed99ce43adfe1a6902e353ecbced64cd 0x4a6d1f3e9f47b3ef4a355bc5da6c61a3a49ec8d8 0x62a5d0db62386515bc238d9c3248761344c603e2 0xb0c83777482b9ed13e79b246770a0818b0264b53 0x779ee4eae8159ee0b5b112c8f25e0b61071d3202 0xf67712405c47660d21333b52d6e8b1cbe6b7e547 0x28ac75783dce4bebeb4a0e80a13059193e1a32e7