ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4B12B0168F5D
|
Infrastructure Scan
ADDRESS: 0x6dc3acb8b50a516b52bcf54ff025260eb21a7bf1
DEPLOYED: 2026-04-29 07:47:47
LAST_TX: 2026-04-29 08:36:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 36 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x17a38c39e02861c6a8facdaec9ac3676d3d9e9b1 0x9d38d179d69005caf137ea29df7f929415258ac1 0x8d5556560a5b186e1ce30d3944062fa50bc7d4aa 0x5802f451084d3c6bc563b43c121bab631e0f51f4 0x6b23af62bd7f16c015414b61474d6b222939fd3a 0x6e1d13cad41d4ec8945b0f4be84176f993c5c546 0x90de03670ac825fe34f21ca85103e548664d8f76 0xcc5e67d0067f2ef8e8ec556b935ad842db698353 0xa9a039b551f59708c67d94fca9c2bb1c016bb42c 0x0ad843dab3cdb0dce46fdd8e40b5240a29c3a5bb 0xa38ffd1aab90b5418a0a6cd37b3da038c0f018c5 0x5a1985a86525af3ad1abd8fe9391527e12354dce 0x19c11f7b200e93b8564828e7d9a6049a8c5b6e09 0x8c6d1aed2943e5a5ab30dd688ebbdf21c5a9e627 0xf66b0d7a0c1c182e530816cdee6ea062b63e35e9 0xa577cd4d2db3bbb64f707e66d0932b4e4bd1d591 0xd653a699518d7d0f277bae7ae902b7a265d05e26 0x282cdc34433dc59142fbcbc13b8f731e0b2d2670 0x8d0091e55dbe229215870e88b05b3ef1161029d3 0xb4483f605c6f498fbc3331e1a74cc6c0786f4c3f