ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6E205A8FDB74
|
Infrastructure Scan
ADDRESS: 0x4947c897945973af5dd69f262f2dfbf8c1808d55
DEPLOYED: 2026-05-06 18:52:35
LAST_TX: 2026-05-06 19:27:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x4947c897945973af5dd69f262f2dfbf8c1808d55… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 6 public, 5 private methods. [MEM] Tracking pointer 0x3bf0a20e in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 35. [SIM] Mocking MSG.SENDER as 0x8738026172f57480ad5f52ac248921fd2317d0ec. [TRACE] Bytecode segment 0x18 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘39777DEE’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x200ddffab804307e0af8ef9b8659f71353d752ba 0xe4eb8e96207cfd8527627feccb3021e9fef168f8 0xc53aba9b5b7b41b20f589982086b8af9124b6e9c 0x861d13a5c74b789d7da9b11600754074db0c0f5f 0x2c7cefcdbfe648a1b9453df43cda02f79623105a 0x770c0903c5bdc852366b7caeb3fd7c84ded1a685 0xaaefdbd94d5994791a881ce68cd91d56d5880d98 0x4e63b3c798446e32959ffe829af8bd97525daec1 0xbcf17ae91e95fdaded482f4f528a35901e2b404f 0x1f7c4c2cfa12455405d2f38a9a052b451d77101b 0x6a44638f1bef3bf8606edf3bca5ef6fcb0531db4 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c 0x5f926eb828363046c959433cd2f4774343f1c0d7 0xdae057e20c64d81f593e070a1d7e036d2cd697fe 0x370b3ba7635aa627c131b88af28a6b4ac2b39ff4 0x8f540c92c320d092be4a1ce116a99e2f3b2ede34 0xd90a37f2f783eeeca271951deacf80e7fe1ef0d9 0x84265fde7f9ef69ffc62817947430ca9262ed644 0x5106e49b157c26ec1665bbb6e9ea4d01a15608d3 0x003bf6adf404d5d295a394b4c38a87a6c4e8fa34
Leave a Reply