ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5D9FDBB4DD5
|
Infrastructure Scan
ADDRESS: 0xb6ffcb4760581c64f5f1f3228d0ffd6ce2e40bf0
DEPLOYED: 2026-05-07 20:31:11
LAST_TX: 2026-05-07 21:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 67. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Tracking pointer 0xbb2bcaf6 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 16 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0192423ae3fcc2e52c80462509f24cc2859cb9d1471c40ab49cdf562151a8d5d’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a8c68634872f822ae6b933011ff933f458dbf20 0xd377997a6cf15e91782de032c78cb230a6347fed 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0xc7bc2415f49cd460a9270bf87d926f378d955b72 0xdd4c7a418b06ffd1497ac6158ec8ca20e16c2ac2 0x0021dab69ac9131af487086758c74f3aa19a7ec8 0x7f9b8a808ec97635fa17fa7f85079cf8f7f14ecb 0xcc8aa0ea17547515b661d830957bfd19ced41d53 0xbadeb510477d2dbd589570ea591546d372f810b2 0xb113f15b7f03b0ceed28973f4fa017ea1a942316 0xa02bf3bb3f277dadc981b9f782a14406086f6c15 0x3dd1ae589bebff34d784d2ef1e46b7e592708aca 0x7546375894b2ee645f1e9ed51bb6aef9dc5196ad 0x84b50a8043bde970e3373ea4d6ec979747735d91 0x1a704e2b18dc8e2c140a423551e870da01afa5ce 0x323ecdc58381d4608931421b1673ebc15af048a5 0xe22cc9242205dd387e75c3552f16cc6892088329 0xdcc07e8eb8e9146002bf2502b628e9a441d684bf 0x4e67deba7edce5b1ae27618967d24ae9404fd646 0xc675de2849b954b05f4f1a6f9fd44f42336b1252