ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E1C46220364F
|
Infrastructure Scan
ADDRESS: 0x48393959feac43700602e7d6eac2cb63dc02353e
DEPLOYED: 2026-05-05 12:45:59
LAST_TX: 2026-05-05 13:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.13ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 67 iterations. [TRACE] Call sequence: a23e -> 7d44 -> 9280. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x73dc5033e3e4280c18ee063616c2b126fce78f82’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8f12a2390a38aaa22fc96ce32febe5c69d7928e9 0x220f30af0715c4598c98a841b2b79d71ffb4cfff 0x5ea32b4a6b8c1b80eae9525a71dec314cf8f40d2 0x93f28b2322e6a7eff4ad72a81976ea09c0680255 0xad24b42610521bdf8547be582c16f65ceebbade0 0x16a3a76503c74f26f394965c5b639142aa51a3da 0x112ccb5107d334f0cb11c7114f85d21dc516ce0e 0xe47244beb2832c0dcbacdaf756e5b46929d4c5a7 0x29e75bb6a2e4896837f92b5cf77e8a1eb98ba8ea 0xbfb204a3d6913dbbcd11ff178a31f076b25fc117 0x5ac9c491b7348cbf36f34b3ad5ba952116b4b3fc 0xab7b1b06855ef7276999f1ff7b675e82cd4fd3f4 0x1d00333907808b0e4dccb09b294f0d8d25dd27fc 0x17c9d1865493fb0d12cdac3aba80fa391d4be6a2 0xa6edfdab8364ac14ad4390cbd026fab73b2a5f02 0x28985a05c5aaa25dec48029aa61f1c48511c1074 0x6d70a7680732d403352327540bc50301a45aac26 0x5f03d2aac7563a880554c9484116d2012b78cade 0x3f76fc4360e8b16e3ea2e35f918c9f3734ea8d3f 0x8ff6f7c5c747ca5316ee85a29890f8979664ec20

