ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-09F3C7BBA613
|
Infrastructure Scan
ADDRESS: 0x65f2f8c8c578941e74279bd5b0864f0ebd8c41df
DEPLOYED: 2026-05-15 23:00:11
LAST_TX: 2026-05-15 23:53:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 24 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xafc9. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x15 analysed. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘7b7d26fb…9ac30813’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x968bd363728e85d696b2c981a12864e32337c2d0 0xabb26697a75f85e418874f315de0be895696da01 0xc16594073ba9772e21894841dc173dcde523d332 0x9f90ee6811d73f6a31f14d150e009743a4656d1d 0x083e9926b17fc58ae1643411cbb0bf1eb1d268c2 0x7fca92148998d7133adb10ed3338922a46fff495 0x03a968f58b37965c025c76edcf6b3b8c625e1ac7 0xa28ea44ca0ea37164a9721f87e9b258613e385b9 0x7431b4dbf8e0815ea642d710a3f863d9b650956b 0x4ba69551cf74fa89e1fa25ac8c06e888a807a360 0x241dae91bbff4e679962870fc29236f173f9da87 0xb8e7f76179136f6385b49bc0841f91608e0c3cbd 0x1ef5ef19044c2ccb55affc1099801ff907e51270 0x8366df3094ee0c56b3f149a2a8f18ae4e8605499 0x3507f69f70bd7742a1334017b5c7b1047ae1f7b6 0xeae19468196d22e5b1aac137020f1dec1759ebeb 0xbbef059443857600b13058d04da25725c12a5e85 0x7559daefdeb445c6e3126b7102906a401f09bc53 0x94603aa388f12abdedeaee810e530f3e3050d7ff 0xb6615177596973bdb99d64da80eb75713330cb0c
