ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC0CACFDBA03
|
Infrastructure Scan
ADDRESS: 0x2fe4595a2a09f66f5e1499e9c3fe41f788bc0408
DEPLOYED: 2026-04-28 07:34:59
LAST_TX: 2026-04-28 08:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x2fe4595a2a09f66f5e1499e9c3fe41f788bc0408… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x5b. [TRACE] Bytecode segment 0x7b analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 1006F339 finished in 33s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x40bf67115a4e911e70846c91828334dfc2a6501e 0x05440e0d91b47d6fe61273db8ddf1c0bf32f757a 0xf3546fc56abbe8fb9c7a8cc2a8c1d8a3e226ec0d 0x38af0ab796703e2c1c51b3f6286e1582d8e93d65 0xacd6ba7191d05562e580de8b21fa8fbfd1677e46 0x0588d01c8286a9880a798054dae596400b81b3e3 0xecc91a23668647da04df50e23f2f48c9f9d0c1dd 0x3b77dd5da2d023f1d9a07bc76c4d5f897438ec72 0x2f1e05896fe2d2204861ff7e6ba9fdbb6e588de0 0x2f030d33c9e7f3c1ac6b6e89eee7b05f449ab2a7 0xd273ad4fe671c10ccf3ac7b4c9119f18b74d5c72 0xc60b41c721c43f84ee9f943d2b3a3df4fde8aba8 0x984a067b04a1cd253ac26969a2d1935e2ee7b5f5 0x8c67513c37822e964e63812141b69899daddebb0 0x382d41282e9b78dc6e4a261f89d1081702eadfdc 0x2f00c9eea76389ce284409000747f70d833373df 0x5759075843f8531146c351a9e79830e126c655fe 0x2f264a2c1ef2cd464f6dc7f460233fad12d73f84 0xae40958e16d69a629a910f2c8dd872e21bf6805c 0x0eea1ffd1429198665d570145a1006cb024160cb