ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-02285F3569D2
|
Infrastructure Scan
ADDRESS: 0xc1a66b2913e2754804d775cef69b6b22e5febbf9
DEPLOYED: 2026-05-13 05:10:47
LAST_TX: 2026-05-13 07:23:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 6956 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x1d0da72e in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 90. [SIM] Reverting transaction at PC: 3179… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘4cc73cd4e5c01b82ca9da663b974d0f39ad4894e048a9b7b161a1acc0914f217’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc828d27ffd2073e2f410cd0516e5536ceca98ce8 0xb77177f018bb2a7e80af5dda1a67104af5c33b3f 0xc84160e5ce6220bc3a41dececccb96fa5eed574b 0x68cbe6a002608d002b8ac7013ee123b2af8770df 0x93809b1012ac51a30244dc234cd5b6a7440869ae 0x4a3589c5da5afb42f8eb605bff01cecd26a151c9 0xcc0f24a685251edf6afa69f3215384136c1117a2 0x5d5e31fa1d65830eda11d83ea3b0474315e57ad8 0xc1d792c104feb9df119e3e9e8161d7f13b14d3f0 0x332ad8e0f50ead0c8a80913b81065255c39fbec3 0x4a5ff8de53ae0154886d7ed9f56803b444339402 0x64f9f6bde553dd054ffbb6fa2585820542b4272f 0xf315f35a9545fa70454b9d063e22b1f355ada63e 0xdc1730462c9aa3e2bc5e998569f45396905517c0 0xdbb1b57a0bda92e0f9ff36dcce5b4f4edf40da92 0x0f9aedb2f435130208df7a9f2eff2732089c2d8f 0xf7506cbb01a9452e4ff76272ea5f31232e0340b6 0x073d2a770dbb73f63b519e4afbed66e4574bdeed 0x9bd0aade07d7acdf3c0b6e1e9a20dc5e04383374 0xeadcd6a65f9e04289737a3cf1b903e0355499b44

