ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-938349DA7044
|
Infrastructure Scan
ADDRESS: 0xc614aab27b501a4d9779926fbf01c72be7dc3151
DEPLOYED: 2026-05-02 00:19:35
LAST_TX: 2026-05-02 01:34:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 70126106…77e64bf0… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 2299… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x888b035e6f64b1c1aebcd6ddf0c9fd7aebea39ed 0xabeeb816a49fa4681ec7fa39baff27327c26ac21 0x32b3a24ffca65fee1b815eaf1650189be7f8f3f6 0x0a44ffb33a140454573a13071d50139b52fb998b 0x03856c896ff13cef1f6b7d1ac0acd517f81ec14e 0x60b8dcbc11aa8b7fa3b8769b166f4f7ad4751d63 0xa6353173a747c8f7d4e68cf8d7da5a5504da1ee2 0x3b180ecf9b7478e4d02acc957fb0d7bc0f7e4a24 0x333ff5aa2e5ee2d69872276af3fec71c3f447432 0x589061018983d094607dca81cfa36af65b8c084f 0xe545fb610326c3398f3877751d1abd3a06f60664 0xa15b54cc654b2c974bf76e5fb17d995f6a7fb6ef 0x41aca70cacbaddc2d8ef39423bcf02e29a4a7024 0xf63fdb88213fe8d02b6339ef839d57a9e9089040 0x8e9263e474a487ce0f5ddd070873e44cd0c10e69 0x1b5b89fca222b98019a2427570a8939291da205a 0xd14126cf735ec12fc84f30e350c56268de47eb27 0x9d17e142e816fcf484ad8a08745766eb867a93f1 0x369f2aa8374f36ac330fc854aedf6b91b394ce3e 0x5ee923559ee06c183164c3ea1f5569384d36a26d
