ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7580F0061DD
|
Infrastructure Scan
ADDRESS: 0x3a32e8c643213e9abd848dc62966bb3133f5fffa
DEPLOYED: 2026-05-07 17:08:59
LAST_TX: 2026-05-07 17:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 65. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x6b21aca4 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-E25C5F4E.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5f019d975e3ca24d15cc186ad37bd603a3380602 0xe5a346b1659a0d70717e903e7d5d61d2a8d2d1ce 0xc0fec5716b6481d0a4002c9784c6b4eb28098877 0x8ea59a4a46c2b44b38af1ab09105c5d8f9ed28d2 0x889055ef415aad49a554a0491fc9421d2b31dd9a 0x6a514f59362a96e2ac7fab1c9ef13adc3000f6a2 0xc84a8355f90091712948a5dba65df1d4e5f6eec3 0xf7e44d036e0766b9b285cd92125a14f6742efa97 0x12d5beef6f418d7dcb626bc701dd1bc94d1d6783 0xbcab629fb446771d328c37c4e0fef3c45c33f405 0x56f744934414a6033153a80fae3e2ef494a7e549 0xa41643caf560a1a38a0df32b3229c785397557d8 0x8af6c6340e41212a268a2de4b2d9a32ad28e48d8 0x695421ca413f6a066d560ba0b2a267607502a94c 0x0aaed2e098a492efa13b4e9d322f42042d3ab8fb 0x50969688570663a7fcadcdf6c8b856adda9a6126 0xf578509910c8b9526fc0cd5927f8a4724b6ce594 0xf32df5861e98488f317e6e1cd8a6236a04f9b8b7 0xe6c0b39493bd16cd98171dd77c0c952ee6374ba8 0x0a65fec7a0efa69458b8cd0a736e71fd90ffa32a

