ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D55D87DD1FDB
Infrastructure Scan ADDRESS: 0x6023f95a5a307d8264011915246ed6828fdd7398 DEPLOYED: 2026-04-27 10:17:59 LAST_TX: 2026-04-30 12:47:35 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 54086. [FETCH] Metadata hash (IPFS): fdf1c42a…c7934ae4… [SCAN] Detecting compiler version: v0.8.20. [MEM] Tracking pointer 0x5578e523 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xfd. [TRACE] Bytecode segment 0xce analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘c31d0b5b6a219f6ea064de5a0dfe2823e70f42d66dd8d6f4bf4c9e9e03515d84’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd152019c75cf5eb91b322af6929b0f75ef04dec1 0xbaad936c0aaee80de23f92b3746c377af918824e 0xaa0aa0aed0338bc38824dc501a732df21555b6ac 0x5f7c40c39f4a64bdeadbb93656d692b638c43ce3 0x225bc142c70625593863a0443460962b7f6ccf58 0x16f409ca00730231531f0bb955b57a7b7e91acaa 0xea0ba332b99d6c78be3960e224d2d2c1750e05b5 0xa9078dc4d42be0c22814d340c289381e26174698 0x6311e00470d6daabd7852349e5adf898bad9a17d 0x7403345c981bfd1bb7c620a05f9e3844535a2ffd 0x5afcc847047ec5b34376aca91746badf75768cd6 0x10a8ff5f465e4ee77402968ad166c0ed631bd67e 0x5fc3d0caff59102536b49347655ff642c65bc9a4 0x22e82a10d490726bc5132318873220b7ca77da0e 0x7bcd853990eb5a25739ff7df9fc277d7ce7bd1df 0x45be01ce20a400bc2c2e8a7fa42af0a79aa81a33 0x51e9e5c4fcaaaf5e2bd57352973d65261ad97808 0xbd2e1b5b0ec6506fe65cc4823af2ec07f59bb469 0xb2e6a0c33abea58ed4620df287e209e99ab770ff 0xfd237175ed83f0d6296667e1ecccdb55d475835c