ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DF06322411BF
|
Infrastructure Scan
ADDRESS: 0xd7a43751b6160c6d1cbe3415ecb99d6579468660
DEPLOYED: 2026-05-01 12:40:59
LAST_TX: 2026-05-01 19:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x27910c05 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 8 public, 1 private methods. [MEM] Garbage collector: 0.26ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xcdd831f6… [VALID] No critical memory leaks during simulation. $line = str_replace(‘e6feea320a683d73bbd8e4bf0e5031ba5332d4e6f883096e2e01b0d5ae4a477a’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xca181a7ee5ffc37abc76ac400d27695b295dbf12 0x592ba4846468a26b244bc98cd0f74c35f472eb50 0x048ea12a35e14786a2fc61732b2b9cb0a86a27f2 0xbcddbcda972968d394dc4955a870454d5c72df81 0x7de520ff75515e083e7b5cf9aed940f9d63cb3e2 0xc082dc93201e48da04ad1157691991aefca4d7f6 0x2b34f15e0951939ccbfbbb5bc8f272c069ddb2da 0xfd2d528afaa5e7d58811ae859080e5e974aa7392 0xe39b9e3ea247c036350d99e31575d189226c1238 0xfcd7cc4d44b8b4c4aba5b56b73538a29494791c4 0xe7aa9eba834278992390136e97d9f5d69a1c68ae 0x1067fa495ad936fe47f9d7aa74c2f8ed55f3d843 0x0377d05573acf3d7e0c2d1e13dcc47537143fc8a 0x7dcd1466f09b699ed73d743ffc0520cde1cc2ddb 0x293d8862fc4c233c171a5ddf8759325ced2427ff 0x7f1ffc1609842e415ae724b94454d3dce3ebd40a 0x51a0aca2d12ff32e49918e4a480561416f1f7a17 0x8250ceaa60ae5c40222fbe602750797732cc338a 0x3df20ed9c1c7ceb6b123f8794b54ef3825cdf6d0 0x9d9dd0002a014e82d8a8d3a2d2d453253b489767