ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-419A37D3637A
|
Infrastructure Scan
ADDRESS: 0x733ca847b7235b10a14efb6f059ee7fe172f6da6
DEPLOYED: 2026-05-12 20:25:11
LAST_TX: 2026-05-15 23:12:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 82. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xc733ce64ebe97c9a4397cc8f3bbd211a8ee4ac1e. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbc13bd309f97c5bfbce7f464254d07dce817da2a 0xcc0e148f9363ef13bb1ac83d56c337be1c3f65a2 0x2a712774e65e0514d52e769bf9611a4588034eaf 0x9b4c0cc7aeaa5b22ff067e95d573a463ab0be13a 0x0e9f01ade4d049bd3d0018a936d46eceecda58d1 0x6ec4be6b02bf6c881697de0e01ac191c0bce2623 0xb43be7f23aa7dff35a75d98054c758845c7a975f 0x31accf96519c770687da61e72035b176b5292d78 0xa32a8330611e2d65c8c2b2136b1d6c6ac5546e28 0x04066166ff1e2cb5f1cb5a27e666d0abc3b67187 0x9db9d7252a8685184d2e0e1ddc86867d6992f608 0xa4cddf19a14b533c2dc6ab64cdfc7cd8cb711b20 0xf8db2e5dac42f326425861170b471e68d88d5329 0xd971e1c61123c9146c8d98579be6591b371fe3b9 0xae01a183e3dcbc5a9a4da58d2416249371176d60 0x8a8b37d887b8f6b66f797b2b55803ca6812f92b9 0x99dc2a9731e04b5650b0ab66b88a078ee62f6be6 0x3390492b0f9066e70d680ea362b6d1f768260e2a 0x482b159f0d929c2352061f608f3d7775ad028ce1 0x7a62c8c23a517d24e4dbfdc9ebdb84055348ec88