ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DCD39C3DB838
|
Infrastructure Scan
ADDRESS: 0x4aa78c9bbc99bcfc7fb6b99c943cba48119ed72b
DEPLOYED: 2026-05-03 11:54:23
LAST_TX: 2026-05-03 12:19:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.12. [MEM] Initializing storage slot tracker… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 16 iterations. [TRACE] Execution path: 75% coverage. [VALID] Finalizing audit report for 0x4aa78c9bbc99bcfc7fb6b99c943cba48119ed72b. $line = str_replace(‘0xf9cb12bcf12bbf0aee9403ef34921bcdfeb6e3e2’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5ac9c491b7348cbf36f34b3ad5ba952116b4b3fc 0x57a12a2369e811aa5bf0ee2368c956f08d11b322 0xe3ebaeffacb91cfdb4d1d4f2408ed816c7481f70 0x930b04461de9974fda395e9f9be9281b31c48ce7 0x61c3eb427f0d64543f44ad1300df4bd3a5dabd24 0x15a93f5d3f348a38ae33f6d4debe4f04f0ca0ebe 0x912fc775dfc9024bdfdead20222bfd285abb3554 0x179a725b2fa331372f32a3c9091f9a0cc1441a8e 0xdc0c5306f81b75cbfe6b5fdee825ba0c2f6470d1 0x6474cf0ad5ee3efdaa48e779bee7335df48c1daf 0x29399b8893560a4f7e8bc756571283e62824b923 0x4c39a6f003f93da8cddc54860097b7d450cce1c0 0x91076b05eb707999ea5f99b7ed06837e9f5c68c8 0xf3d6c54424e2c997d085b2e49fbf6aef3b4280bd 0x740a36718e620f4d6775156170ff3d46f959370e 0xc96f25009d2dc69777ad2051ce54688a08d15eeb 0xed96b6f905b1032a3dff02c7b8eb44e191344c19 0x060610bb80c2d4b271041a8c36b8dd2500ea7e26 0x5e77236b3e59e047d19e81b221f51bf5cf609711 0x09f4bfdbd9149f4782d61df7de645b8c245e5df4
