ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F35EE657A11D
|
Infrastructure Scan
ADDRESS: 0xf4d1aa60bb06a72caa220be762796ce5fd572373
DEPLOYED: 2026-05-01 23:49:11
LAST_TX: 2026-05-02 00:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0×00… [FETCH] Metadata hash (IPFS): f8fa2d43…464de502… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 51% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x75271bb183809332d1111836e3db670505dd03df 0x1b02d8b381a66fe5b9a15f813f1809893bb9c3dd 0x753e29469d6057b49c35d704ea698a60c5477ba2 0xd22c603de86bc70534fb8cca58b80d38adddffbe 0xf6f71292a6de8f8767624feaa2645cba345ed887 0x5881ffb45ac10610a164bcdc5babd3ff5d73a49a 0x996cd8b45427514a98243194ca2fabe13aae4834 0x225bc142c70625593863a0443460962b7f6ccf58 0x75461e8713182e65a0e13abe95bfbc1c735901cd 0xb1c683590a1f401efdf9ed8aff5e3b530c765fd9 0x30ffe13d5fab2e42b313c8c4a9c77454529a90f5 0x133115fd0d6f32a87b9671b0c626dd483a2fa805 0xe3c36bb5696e12cc818e698edff167271f6d6d79 0xd3f24f68fd5be45e491c6c24293a77bdc41a2937 0xd8468686b44039f631df2232d2ae526a954e5043 0x0a6b36112b9df234a37697ac2cf3c0d055eb5e4f 0x1a4402a029c7444f5abcb366ca7d2c4ed709c728 0x1cfb0c2539024a67837b241543c6cfb4e001e7dc 0x1e84f42aeed8a2c57b50b108992026024c3fed0f 0x5c3660160a0cc4c9b08dd3568eacc1e9e9f165b9