ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-821F7CFD9112
|
Infrastructure Scan
ADDRESS: 0x87a97d9cfcfdef043e9f0db783cf087caa1fe5fb
DEPLOYED: 2026-05-08 03:31:11
LAST_TX: 2026-05-08 04:40:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 9.27 bit/byte. [SCAN] Identifying function signatures (0xe6d1d6dc). [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 44. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-38A18EE3.log. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: db686ece…93cb6038.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe1bea7b7752d3e6dce97c86e754433f91a453260 0x1f62e359635b07856068daaa87b1dc2b85c87787 0x7770a3fb88fa42fc01b97b430729ad845ae9c266 0x1dd7f65a7f50d0d6da8140898c96efde753f5b74 0x0a46bcb5bd15315a75ed7d9934bc514659230ec8 0x4e8288829289c212784e7c9ad5114916c1bd92eb 0x4f57957703bd91726be75cfa126a26b11844a021 0xc5d4887dc1b5bde744f0bacf82c2a59a5394bd9c 0x0023304736b91560062f272266f597d9579296b7 0x9d09e005d091a751de830c2c0eaaccf8926d38dc 0xd892493d5e87ce5e31d8aab1446a1b0c12eca5b1 0x5847edcc0168c829db73644081679667e6985fa4 0xa9b138259a37cfa9747c5b4823a01e7ffd2fba6d 0x5282012e8269eacafd4ad7ca6b906906925accdf 0x885596ee329812121e8858eaeb75c5bf89a656f4 0x9eabc4daa1b923a6201c14b997ae6355a3001b4d 0x55aefa20905246402bbece98c36e496e73faa83a 0x494f9023411e431967842ab441fb8894cdb3bd06 0x008c4c2e7ccc40bf68024f17ca59ef794af95e16 0xae078ae7447de3f34f414be0f699bda83e259f62