ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B5350E892952
|
Infrastructure Scan
ADDRESS: 0x6204e7965861161964072d2b80435669bb3408bc
DEPLOYED: 2026-05-08 17:20:11
LAST_TX: 2026-05-10 13:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x54b816bcc505378c7bc66acdb906680851228ed7. [TRACE] Execution path: 82% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(’44AC6BB5′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdb3cf3719d516d7b4f1bbf91e5ec342836be7e3e 0x9398186ff93329c1588a2689bf2915f17003984a 0x8e01bffbef84f5d8e2e1e203d0160cd2239a7cd2 0xea32461890e3d657a537582b251231c7d5e924e5 0xf653aa9ae33015593dc17ac78ec9f7af93058db4 0xd2cd7a59aa8f8fdc68d01b1e8a95747730b927d3 0xee56a79717eb5bfeab4f9afd9cdfc273056d81f8 0x298c5700c4b3503ea57e84c843439dee825898da 0xe2c3082df0ea5f3606e7adf6aab1b559a03b5ab4 0x69df1a540c396853bc570460eb62b4b391af7a37 0xbc474df0ea28492304ca9f448afc0add277d878f 0x155b8ecceace7354bb00648b2ed9114ddff813a9 0xafd4faeeb8af384cde9ac1863405bc2af0b1755c 0xbfa0595866e7ac31695339a48deb4ad2e32ba779 0xca7683bd8adc59ec837cc9de3abf7b4a5d273ce6 0x5781d6531b37f1e3aa12b8afd36902a525581258 0x8f12a2390a38aaa22fc96ce32febe5c69d7928e9 0xbde310e2862f1a3c7abe443d46f851aed091719e 0xdb68c57f5e2187a39cd7ae41882bde78138c34cc 0xad6ae9c1505a2940323a4c4bf4394b1bb06760ab