ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DAC62A94379A
|
Infrastructure Scan
ADDRESS: 0x11d6bb6374fa927953a74cdfcc95f57fec2da28a
DEPLOYED: 2026-05-14 15:05:23
LAST_TX: 2026-05-14 15:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xaccf16d0). [MEM] Stack depth: 4 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 63. [SIM] Gas used: 46703 units. Result: SUCCESS. [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 941f7161…d9259b12.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fdf7c85291b721e83ac822c349f0fdfd3305193 0x6c759a7a3fe43bae743a763f8b00d91a8fca7a44 0xaf87138bf9fbf4e4a45c1a3a2aa5aaba8f985263 0x4dc0f6b33108a0e96813473006663ca0a66edb6c 0x170940c7596e72e5e862c122583d366db863c557 0x937aa4c74d8841eee67c3d12cdde6a8a6f9f1504 0xca4de178afa36f47fd5bf5a412132197c459ad38 0xf4fdb2d875189be1636c5bae8d83164b3cf586fb 0x6d2bec10492e5715b0b46404f3789c3657c12b44 0xc02637d8bdc9cb4e39e904df4209b7bee439d323 0xdf88da683b0f0367fed64c178912a621a8f712d8 0x83df80db41f7aea41daa374efd01818d26ee76c4 0x6a445e92ba0aba665945cc273fd9e1f822de4a75 0x315d3626365f1ddd4ccc7e0535be91bb26dc3c18 0xf9da2c7763d59deb3ef9b8fc17801de8de6e797a 0x4a406d050f8d7a7414ccbba21e94f4c21f4068c9 0x574089054a8a4ea460586a35b13094da39647bbe 0xb8e48386fc601c80b8651827e4c2d34ed2e7b32a 0x21f331b4cf30e3bd1c2f08686d308cc0d9521e7f 0xbdf38d4791b6e7158b81743f5b7eab0720944d1a