ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B41C765C8A55
|
Infrastructure Scan
ADDRESS: 0x0638f8df932986100ed7da8530a0f4559cfbdedd
DEPLOYED: 2026-05-08 00:19:11
LAST_TX: 2026-05-08 00:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xbc19962c successful. [FETCH] Bytecode size: 2093 bytes. [SCAN] Identifying function signatures (0xa24c540c). [MEM] Garbage collector: 0.23ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 76. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 97dc -> ea55 -> bb67. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a5e5485aa9d8e8515a9238e101266aa30dc17a3 0xe925754c0461e9ec3f0ecd333fbb151aca5d017a 0xb3c94c3e8177e6255fb6f95b285e34c3b79b3735 0x215760d6309d35006ce06b4d59acc8ee6d5d1bd7 0x33b245fba74dd91539806692d982a0e445c2e7c3 0x655bdec2b67448f4f47a70834906377dbd2fdc26 0xb1eec68c713fc020189fc8380dbde0ef79c931fd 0x8118b116773c38ce18486a4f2d5d53028a558ed6 0x6f0ea63b75352cc6868799a63d294965de551652 0x4f443ca1ced2a5798f1904b1a3751d3b0e15720f 0xb7c5b062f1d475eeaef86dcbdddffe117d14c0b9 0x169f8ac0e53b6fdfeaa19147c03f62c30ccb5132 0x99735e588d9d49d45cce1f4c1d7041dca0f3ce7e 0xab2379f47fdb1bb489844b8db693006430550b97 0xd200b31b62df713bd9bde67531470e20ff7a4a52 0x240b58e4b8300b5339c5fbc307165b4a17dbefcf 0xa32608e873f9ddef944b24798db69d80bbb4d1ed 0xaae4a23bff417b0a26e3db280ad890005a4895e5 0x446156d336f33c4a9120dfd475a08a72e989b071 0xe59a4954bc3f969225781af20f17182eb2118116