ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A938E249BB5
|
Infrastructure Scan
ADDRESS: 0x5e71b2d2248b203ba3ab940acc462cad8093ef29
DEPLOYED: 2026-05-14 08:30:11
LAST_TX: 2026-05-15 00:29:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 686d80ed…901c85c6… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.16ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 56 iterations. [TRACE] Program Counter (PC) synchronized at 7416. [VALID] Finalizing audit report for 0x5e71b2d2248b203ba3ab940acc462cad8093ef29. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x700a4aeda23a8a6986594ec5e942c75a5fe88184 0xfcf675cd1d46a1cb10e907283d95f9f47b39afd1 0xa9897f63104e9b46a7d35133e8beaff6931edde1 0xdd144bf7c579608f5656d362ad5f72da05f05cd7 0x0a5ec957bea75ead5ca916ded1c1d26fdbee677c 0xd1483ca2b66ceb99996b5e2cf26419b0ad528958 0xf31779553d0da6078f91d7f34077386e6128a4e0 0x30ac7465ad160ecc292354bd196491d56fdb6a13 0x2235b24fd0e54edb9a127b4470e75a6de5df0875 0x50f6875f0bbb63635b44ec0faff69ffbb2b9e64a 0x21457ff71392a1506d4644497fc9462871102b71 0x40771981e03cefca0e3bba66bd04bfa377efe263 0x3126fd64abd11f2282b4d49cc4cf1aca70cfc061 0xe4cfa40c949b60ea1f4ee91d339f143f8abef54b 0x0b6374f57cbd4733cda6c31d42d2e976c8376758 0xb9ed76d9f809b6d5218d2dba6c4f0ab343cf7216 0x8ea39e47693ff7704da9e5625819202ecb246795 0xf0aa0dacb1999c14be2dbf176683fc08ec98c26b 0x5679bfa87b72337afa9f5b11d21a82bcee3dcb32 0x58aeca4d4a463f7c883833ea8455360c64a779b4


