ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B37E4F996C7D
|
Infrastructure Scan
ADDRESS: 0x020c232e8e721d4cf76cd42233709aec9462ec79
DEPLOYED: 2026-05-07 10:48:59
LAST_TX: 2026-05-09 05:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x213125dd successful. [FETCH] Metadata hash (IPFS): aadfa86a…84d30326… [SCAN] Analyzing visibility: 2 public, 9 private methods. [MEM] Virtual memory mapped: 0×0000 -> 0xb986. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0×12 analysed. [VALID] Finalizing audit report for 0x020c232e8e721d4cf76cd42233709aec9462ec79. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf2e2d4898c7b621313195002bdb799c04d1c8901 0x27bd966b1ebdce6d317f8f11cc7e56e7279e2336 0xa7cf861628279a6673d52824a6f038cb0d3b19c3 0x483a3526109e895815970636b8763f1951a3b006 0xd95888a281f50adebfffd1d8d324b6949071341c 0x35a6a3b955883756e301d2f1da191c35fcb209fa 0x8e92f5b951c5fd54a8217bf91daab6aff2d5b1af 0x85cf5a9b7776d909c3f31d68f3c8f648873d0d31 0x407e82bf9a2aeccfb1919c11f574fc8111336e19 0xe56adda3088831dd42caa99c703956820eb66849 0xe1164092ce4f25f41fdccd80b66c1aa6d731b00a 0x56fbf1a8832895b8d993b91029b26a9d02eeaa73 0xed8a55b9f0ea58b57c2816989fc3935fe8240763 0x77186a1711a16732412755fc239d3474ff2e03c8 0xca14e41a42422f9f9733109ef428ca6d41424da7 0xea7df96e61ba25f7ff67cd7c08d5190c82d01ffe 0x62a5d0db62386515bc238d9c3248761344c603e2 0x0cb9a729b821ab26714e4e3db73236ba1bee7de3 0x0b7ad39175ad205e8f12c69f9572aa7e3d20e9a7 0x75020808a191406d525e86da7d3bdd4612e4f42a
Leave a Reply