ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37782B6144F6
Infrastructure Scan ADDRESS: 0x0caf316f6d3c91a95e815d3cc1420cafef7abd28 DEPLOYED: 2026-05-11 16:11:35 LAST_TX: 2026-05-11 19:01:59 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 98. [FETCH] Metadata hash (IPFS): e121d233…972b5b64… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x68a2. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 99% coverage. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘e121d233…972b5b64’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x66cc87625e2ecfaa0a77150d97d603a7a27a4c61 0xfd68ecd526f81b09813828d8f6ffdd492d2d3233 0xfdcc5ee6972a0a71be175e22e0089b28faeb6411 0x70db13ddb95ed21f286937ef6dc4d5aeceda4345 0x84443496f4b8de2ffbd9763035f2350a83db2307 0xfd528f8c2c2ca092d0ad9706d89b2eb081e80c31 0x1007449721762ffd4099339a75db148ba92b54e1 0xd069c5e306e0338b4bc4ed4e9eb9310032a7ca4e 0xb191c6d9e1ba6ee6a06c21cc5b2f4889c78387d8 0xc256ab7afcaabcd07d92370446abfbf7866e6a59 0x92379f30e38e8e9cc3582f9b70a5918b1c6f6be9 0x8ec23f017ee3f4523bb034340c8d5c62913d7d1a 0xfffdd2c3f4a48e42667588899c860bdeeb2b9c39 0x5d688ab9c228dba09bc1b4a436506e36a6d057a8 0x0b4dfd735680b6d3d2c0c9bda23a80f5e15a47c0 0x478d54c97dac863fd48fee599916e6cbe2788375 0xc9c76b2acfa078aa6837a4b4ef2351d73333b135 0xba1ba6ced1b7784962325e87d58817191cce0019 0x8233b1cd8631973e69cffcbc10efc4b67e1d9462 0x0143ea11436125efb840b8f081e9b82f64989bcd
