ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C01DB45B80E4
|
Infrastructure Scan
ADDRESS: 0x47f417c10e8cfe4fa44b90d7d5d99d022b87f200
DEPLOYED: 2026-05-08 12:37:47
LAST_TX: 2026-05-09 16:08:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xf71e689a successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 32. [SIM] Fuzzing input data for 14 iterations. [TRACE] Execution path: 85% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: c03c3b25…e3996e49.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3611d36a7c052211d6f3b1a39326ad38a02832b4 0x29bc08b379f441080f1f996020dfed808ec13242 0x85d560775115fa52cd07cd69bc6b0f0633ef03ac 0x9a3799f093d44a9fc6c8f1209e2ad340e70944fa 0xe4e78783ecfc1a61e53b7244c3d826e57673dfbd 0x4655b96d276dc9108e3360d218015b619c5970e4 0x4d56ebc93cc2725e9ae99842f8778366d8312924 0x5925c8fc77e4e9b811da1bde6195a6fef2f4615a 0xbd09fee03d57f9c2706291e07d64e9f3c823a7b9 0xd0dedeeafc868334656a785362120cdf7c1ebe18 0xd609fc50f6c0f027a5ff8517805f7a31c634fe05 0xd5486d4dc669faefd93096baa9a8466a3e8f2773 0x8f3e76ef6a831d57ad965bc05a5466a54035aed3 0x0b0d2b93fc4e67e967392fd8b1bb36da23eba17a 0xcc737383eb91dad5e30bf316007a77cf38af6598 0x8f292b5449a41b640badccabeef41be3bd158f0d 0x9f6c358d310c9b499e9a6b25fb6d7812afdf1292 0xc1cc67b6311d92737255fc458c88fb15685b8346 0x72505ee5f97d9a6cd3fdfd731efde57537821f87 0x31c8b1c385e981c19a7a26fb03ef8afa76e9309b
