ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C55C68E9A789
|
Infrastructure Scan
ADDRESS: 0xd7c15adac91ac04fb29b05acc1ddaf5801bae0d3
DEPLOYED: 2026-05-02 21:17:47
LAST_TX: 2026-05-02 21:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x71b7. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Balance check: 7.88 ETH. [TRACE] Program Counter (PC) synchronized at 3433. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8aa92b13ee0c8036208782e996ebaa0811f17be6 0x6ec32c5223d2fa29f8834bb93311a0a3034a7de1 0xcfe85854ffb02581157bbc23e4b6b6a0b8afd57f 0x4ce25e2bbe6732bbdb3089e7a9be59eaba576cfb 0x8b992df350d5c8d5cacb690b0b24cbacf2eaab1f 0x93a3a5e8ecd4cb2bc49bdb497024349cb052b7c2 0xd2d16d92f88c049cc9dd1c1534fe2319bf75c151 0x1772d06264c006a7b5d8eac4e71ea38915c778af 0xc9a2a30244457a19f543e0b0aec2d76b61516cf5 0x18a3bee66bffd01fa2d38c8e95cbb3c0ff198127 0x0c857067b75ef8c9ca692f1bf7ad48070b5ca378 0x1478d526aaf98d1232611c42e793a04080525c05 0x64b92c297ae404e374ff3900ce3ed9f0315aa4ba 0x24aa28b2cb88cae39a95f84d7b67e9f290712bc6 0x5d8e3c6732f5f49ce062943335782dba4b4a49cb 0xbb74fc1bd36a0ed017223aa4b0057a6a9941eb32 0x36b8ad3994dcc54321906938473191eb475b9be3 0x0443aa3d9657975e1c0b3499d1162db337669e28 0x34991e1bf2f0d9110260c8af750919ba272e691f 0xc301b1633e1736396649bb386309682b9271bdc7
