ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6E347A4BE476
|
Infrastructure Scan
ADDRESS: 0x32a5c3dc41290a6d3aad8078e4cf94df4dc6fadc
DEPLOYED: 2026-04-20 15:24:11
LAST_TX: 2026-04-25 10:08:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xb084. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x56. [TRACE] Stack trace saved to /logs/TRD-6CF1ACD1.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9b629ddf085e7fb1e5947961c66f1a9a71fee392 0x51e9e5c4fcaaaf5e2bd57352973d65261ad97808 0x30b9e66ac81c3eceddaf3a31de77dbfde8911a1f 0x9772794000927785437ee512d8d8064e6df4243d 0x352a86fef0c22d84368f2557c11adf313aa10a02 0xcc127236c75188aab28680e3260be026968301fd 0xa0f799f10db40e089f14c397843db8c6f2083948 0x345f65c6354102e4f53f56847d3fb33478b3699e 0x99a9d0017e828c56079ab0f9631ad105c27290ce 0xcad809482869b7db0c4487aded164b2bd7db1323 0xcfc5f3c9d625d626b988235e4e1c3d17d539faf2 0x86ecdbafe0e2c6052beda7fd789c62920a0baafc 0x2857dbebc4b958d1d61377ea05bc63ce3b5e0982 0xf936eddd0a508d6f6de7a57bc130e20efd3e8772 0xfdc97d84f3e9bc9b1fd2fb16702aed780b275631 0x6dd1e6799b67434601fd0c65cf13d4df9278cd52 0x2344abd23aabcb10cff29e859eb85c8d064f6608 0x00b8eb83b1f499507becac17f2bc8a3aa94055ec 0xc34ce86a412d3683196df5f3a5ca7fd9e78c3f0a 0xe8cf7c80518cb3b6e4b5eb6d45cf13e7038aa018
