ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A3B6683EA237
|
Infrastructure Scan
ADDRESS: 0x0fa08bfd2b3d1192ea188fe39beb3f8d403d9340
DEPLOYED: 2026-04-20 13:33:47
LAST_TX: 2026-04-25 22:08:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x14. [TRACE] Bytecode segment 0xc4 analysed. [VALID] No critical memory leaks during simulation. [DONE] Scan task D6210F0B finished in 35s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf4d6d075c7e8bbb0a396f7064cf76372d4c8c767 0xc766660d3f390214e2e1efe97e432b003842d03e 0x4899a8e5daaf10629619e6b606b851e028e1105b 0xf6ec158f38e30a8fb9ac27b719cb05b8e37057e4 0x749eea5a9e52f4abd9b6addfe942cac3268d67c4 0x6ad6a4f233f1e33613e996ccc17409b93ff8bf5f 0x865bfbdebdaddaf60e2a763f244f4ec66ebaf19d 0xcd6d64714534c351c31577ab874c7ea9adcd4ab7 0x7dd3ab088e5b6f4cd0c366edae81c5ac10a6e779 0x4f95bc1d9bea8a5fd556146987910cc9ade50dcf 0xe96835f8b8a0dac5eb6c68982d5c33310350d841 0x048e71d9721f7328e68e57300803cabdde22308b 0x63a6bae46972018405e6443b07a24c3e6e33d5b2 0xf3314c1c9328010aad2215602c5d92b97ffafc27 0x3edce87064be25674608ac68ba31bb27dafbf664 0xe833e3de1a7295d5687b0329463b96c9d2117fd9 0xef5dfc61dd6e5d771b71e8ac067df920a20f6079 0xa6fd38c292c0364e7bb9da0618db259f334efc95 0xb6432a066e78cf24d4b6a645a59ef76898337e4a 0xba0c95945e5029951ed33df369a37fcf3f0757df