ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-945D473D94A6
|
Infrastructure Scan
ADDRESS: 0xa7a29880ba3379c08ece00c2fb32feb18c4bb50f
DEPLOYED: 2026-04-24 04:21:59
LAST_TX: 2026-04-24 05:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x43928abf successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 6.31 ETH. [TRACE] Execution path: 27% coverage. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 74f1f6a4043331e8ad516bd47f330cad0a213284db46e9dbca44d7aef675cfa7.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9cabe855f973e44638ed7bad6ccd9738ace2aa42 0x811ae87b99740d607cbb08a3c7a2aadd67143667 0xbf56b7cbd7e8f7bd040b0253b055e5a972a8ac20 0x6a4868fdc2d3981d3e7d349c6c1e7cce4ee0b0c7 0x992fa99522434d1951e9d9c87aefc26d0e6a71df 0xeadc9567687e4d7d9adf60ea6bb17e1cc8a9c851 0x7189a40122994b0d93ff9a848af3df13da20db31 0x9cf8bf1669e0fc883baa413b309903bc417cc82b 0xa7a29880ba3379c08ece00c2fb32feb18c4bb50f 0xb638473fe2e2ac93fd36f9dec9e69734a6a382cd 0xbf31aaeedd2a8d11d25079134739d96397dff8d3 0x59cc0b18f2b8b86956ccb0da8d28eb8fd042103b 0xd30d627f03887633815b8a67f0b9e076e22e340d 0x851805fdaa7a8fd5c005cf69b6091eb1c68bdeb7 0x8dba9de814a4c8e0edb327b797ed26d59f5151ff 0x19222eb4bb885ad990d8df2a2ad3f6e64cbebf00 0x9a9800d1131f34034afcdd6db9a43e19893653cc 0xa073fb348ff3950b224471d67a6e3244bd1eeb22 0x8c93bb3a7ed88da0647ea53f8cd3f57832a513cd 0x89b06ca94cd7b1774e34608db8fe2bd41aa188bb