ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-21A65B76F490
|
Infrastructure Scan
ADDRESS: 0x845700df56a1b4b28e34f4b37ef1fe6afc108475
DEPLOYED: 2026-05-12 23:01:11
LAST_TX: 2026-05-12 23:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x845700df56a1b4b28e34f4b37ef1fe6afc108475… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0xd2. [TRACE] Execution path: 25% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3d9cf13eada18f3bf14f4b53aaaea345c2264866 0xae66385dbfdee0caa6bb6d70151bc3165b5e56be 0x88045a301d5e096e321eac6cc59c1698ad4d8b59 0xe88d230879c19e2ab04dcb144d99cfa8562e1218 0xa3f5c762c4c706febedc10e3f04950dbe47e193e 0x995f155b40c88a62cc60c0fbb328a9bc8f4309dc 0xfa956a80a271b64bc0ac423d412f9692dc99a92e 0xa47d8916509532675e38352adddf3767f399893d 0x77092a89840c1e59d65b54fff690466005ed54f6 0xb334f0a72a46c697e8ca934ae4ea0fccd48ff3a9 0xb85d6618a0de96d229953359a4060a49fc3f06ca 0x6638eb1364bee853b9056f0c0829c23ae35f46c1 0xfa10394aea7b9d4f103779df15df464d2c188026 0x951700b4df1f60edc5662429784965189d4857c4 0xa37c24740d76d8edbfd6290bf20b6c98e23a9ebb 0x21f3d7d82c3323cd4d78b8c2a9456be53b922d59 0xbc89ee36817a5cf440aa2e1d6e940cc21aeef5bf 0xe28c2c8d040ebaa964e019e48957e63a324e57ce 0xe092f2eb44f10f79f0ae0716c98efbe30a5652d2 0x1c89df6c8b1ab81ef90855120fafb93d7fca3254