ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AE4A1F61277D
|
Infrastructure Scan
ADDRESS: 0x0e7e893ff4ba5304103688280b26c48e75f1cf81
DEPLOYED: 2026-05-14 16:16:35
LAST_TX: 2026-05-14 16:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 4977 bytes. [SCAN] Analyzing visibility: 5 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xd2c7. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 79 iterations. [TRACE] Bytecode segment 0x4b analysed. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x11c8274fa2259456a5fcea9ae64c1c6512687340 0xa6dae930ea18736581095e00e7e0cd8460569d72 0xf61a68e73401e9097e7007d35ef76150fa3b2f9b 0xc95ed6cdcbec9e10c8612d3b621aaae6797c1eaa 0x0e5be99f60178fb0c807c6ae0d3971879da39aa8 0x3066b6007a9377267ca49824deb8fb6bfc99c82a 0xf54d8393354571727a115ed5d345076adfa5b262 0xff6090fd04ff101492306468774e129fc950e349 0x24f458bec9a7113f220e9d1b3003d99fc47011b7 0xa75d4767c17621c733b7a0d1eb62007660952609 0xea28284aa04b05dd6737596eac8211e4f4cdd12c 0x7c083754788ade01b23a05fd563dec07c23df7a0 0x6f2a1ac0575294841120b79279020bc7d4f59e42 0x4f7f130a82dfa87636ca290a641ad9a1447e4bda 0x6c3d53f819614cb398da143ae79b7f3450dead56 0x15e70a91aaa282d43ae10d8587524fc003eef040 0x147c2df9b82844e6dc74fe655c1ff0f5128ffae8 0xe8fb0fdf8e035bd5dc703e795fff2e02c04d222d 0xf6ae0689171bccab6cccf955cecb378a61ba1c0d 0x6d2dbc633bd3f6c99be5a113d339282138e54796