ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-927B4215A7DC
|
Infrastructure Scan
ADDRESS: 0x890db94d920bbf44862005329d7236cc7067efab
DEPLOYED: 2026-04-28 10:48:59
LAST_TX: 2026-05-02 04:48:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 30. [FETCH] Bytecode size: 9380 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x13c08190 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 49 iterations. [TRACE] Stack trace saved to /logs/TRD-DE8003B2.log. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb21b3022b01e9a6841a109784ed304bd1c6963f4 0x1805608da1d39f47bb5e46bd098b66cf7d326af8 0x7e20297e88ec1cdb3dd140e545f0b76a6101a11a 0xcc83b8d4f696caed69801cc5a3759b859d8ba5df 0x3a41d5c92054ab3ba4cde69718ad161215f63578 0x64e9c314c29ca3aa25ee5a6c7213a3b9b9073cde 0xf1c4a0b153ff3f521b3b543084cca5ea82992a52 0x77c2e73b0f057ac3c2e159341d52da606d75ec9a 0xb9efa2a91b8a18ccdaba75660ca3a61cc7f4c699 0x7071cfde6647a4c75d4be6f249a5855cd93c00a6 0x937e97dad0ebabe47fb4929e7b0aa484b7e1f7c2 0xd22a379ed84b1832d46cc7ae3fadec6bf3c569fc 0x0fddf29ae35f1ff322800ca98fff4b50f4cd468f 0xe046af96fbcd7147c2ec0b38f707b09a0c7050af 0x59d3627366a8d1b1519ef7b8bfd33b656e9465e8 0x76502f2ffbff7ed1a7a825e1d836edae0af2ea5b 0xba29fabda43e775e1b766c7007d892b11fbd9976 0xd38ed9b6a00ee9a0f91b448162bf65fb462507a2 0x1f235d7bd94155c424ef71a245fcfff2d38dcc9a 0x7cca899786a82297bfa8035b9b7572095373b02e
