ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6BAD47A0774A
|
Infrastructure Scan
ADDRESS: 0xf00011ba090936d776ac080b9f29a50250e68223
DEPLOYED: 2026-05-13 21:13:59
LAST_TX: 2026-05-13 21:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 33ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 8 public, 4 private methods. [MEM] Tracking pointer 0x8e764718 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0xff. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0xf00011ba090936d776ac080b9f29a50250e68223. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x390d667f971a1584ff82769b17e0171bd7222d40 0x0caf316f6d3c91a95e815d3cc1420cafef7abd28 0x49028c5db3ac0a0d1a869ba16b8e22027f16377d 0x66d6f4e4c180284291d90835e268d4da3f5b830f 0xe90b09771636e9511b8cffdfd24e3bed84514efc 0x29c1eafad51d4a1562af6c3b08047b38fb4f1dd6 0xf048bd9c9747137d1a05e7e749a05eb01674d455 0x30ef5088031bac015b944b0cf34f51d438feaa91 0xfefb4211d3e0aa592528053392c73ef82b900514 0xf88f3ae5d9e04753ca0e8cb4b5154552364d0bba 0x6e810d5c33a4355ce1b4107f5722787bfd7acf24 0xfcc2b60a9671b8ccfb242c5104dde7be80c560ae 0xa183ca6e5ddcd2b0e9e3f5436c7d2129354c7ea3 0x5abe70e56f2d534974faf28a144d5f7143012148 0x4334733e00dafdcdcff642617e2b6e727e105ed8 0x392af4a6f6d028459c6ac60b1b51a4527a9ac363 0x7c83e4aa6e7b89e219f4dfce41407bdac97bd94b 0x1c893ab919cb1ed5f3d98c0a6169e912152263f9 0x4725ce8763a77af649157b17b29b292a0dba0631 0x71ac73e7efa0b8fe042c5bae33908c99ad8502e9