ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E01AB9B80D93
|
Infrastructure Scan
ADDRESS: 0x1ee9e49fdc9792ecdeffa18851d9c27c7d68201b
DEPLOYED: 2026-05-02 12:14:59
LAST_TX: 2026-05-02 12:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 66. [SIM] State change detected in slot 0x84. [TRACE] Call sequence: c3a1 -> 46cd -> 400e. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x814ad0e8de32ad0b2391ca699502c307f0dc49a6 0x9c2b29ecdc546e2e76282fab74027e1c5dc31d0e 0x76b2c625253ceb75ffc3d11e169aa86bcae1490c 0xf3fe83010acbdec63203601ef1c16de2febce9ce 0x260e1de4594ca852224a8439c55e608a4cda7f54 0x1e36b485a4fe4437b268f43101937a9e48eaa113 0x9e95fb1bdc7d215ac2d8ebede15de612ddb8c2a7 0xb6b89288a8e1cefd25dbe98c337b275c4cc8238f 0x961ba915ad18ee826d4d78ea01a3ea1a0262f730 0xcc83b8d4f696caed69801cc5a3759b859d8ba5df 0x680fd17893a0d5f8a4ab706f1912b95f5e5b0d79 0x842200969fa4aa8b3a7c8043bc981eff59139f4d 0xec30cbee2e60ad4e4524eaa8b1b244c9597e9582 0x847c0c99775fbf74f2b7b5cee251d5219990a5cc 0xd99c7960379eaddaa893b6d43ce298198be76b48 0xc5fb8e5e89a7df222e84f8bd8d12c565b1f1dcbf 0x71fb6afcd98c5bd611712ad4b8d314ef729aa69d 0x9ca1c3e7c86228f13e3ba10a10048359fbdd279d 0xaa03a7a85f51a135c1bd989967b9e1ff86e9be22 0xddae67b061d66051818783d4965900416a193c3b
Post Views: 1





