ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7AFFB82153FF
|
Infrastructure Scan
ADDRESS: 0xf1a1ba35b7b431e3b62219726363b95c3f15725e
DEPLOYED: 2026-04-22 04:42:47
LAST_TX: 2026-04-24 12:56:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xf328. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0xf1a1ba35b7b431e3b62219726363b95c3f15725e. $line = str_replace(‘4457C72F’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x08cd8701d2dd1989faff0a62fe3b64d1f9cb0b0f 0x60d51c492a8bd3de27ac236ce0a68e6603f46d1c 0x78b51528967998bf7b7299b14c26d889563090be 0x4e072662f43da59490203d453da76b7be225573b 0x8a27ee3ac63ad90f6cb4ebc2b38b82f86d3aadac 0xdeedadffba33c53ef1cf5e76692bac4f7b29c2f0 0xa3e37fd34c8b8765df12cf8ba2f5d77c7f027077 0x7ebbc828c693143d4f2d94b8adb62fe14fe8b967 0x347ed26ffd5105a353863d64cdf3221d802a3fe2 0xe07f5940487a58e30f9fa711be358fb036b0fc44 0xe3a191c9cc26dbe4642934bac8b23a92f8f14c2d 0x70c73d7a098edd3493e40ea4196193fc5f51ae1a 0xb8a913750a4a6354ebd71ad5d810e8f367483009 0xd4e59da7774dcc4b506a13410cc9081718c9232d 0x328a840fd85df0caa448e75ddaf3d7cc8a1b6af2 0xfd73fc8bb55f357de40ce30c33af4a81119c94d9 0x4314107c44e8777d14185d6ac94e5fbcdf168203 0xe4f6dd886077967153e42993709eaf7e220e5dc4 0x4a72c98b0ce2447de1302737c6e42c678f20a01d 0x605007f08bb55164c165c58db194251b25b3df80