ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-678861F27D33
|
Infrastructure Scan
ADDRESS: 0x4c3db57eeeffb13a17b9ab19e0074d27799845dc
DEPLOYED: 2026-05-13 15:44:47
LAST_TX: 2026-05-13 17:01:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x745b. [SCAN] Analyzing visibility: 6 public, 4 private methods. [MEM] Garbage collector: 0.28ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 92. [SIM] Reverting transaction at PC: 6462… [TRACE] Execution path: 66% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘ED88480D’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x47a9af25667ea0329815ebf95269477885408327 0xfb6683be54f360b6509e7c7452fc55e673e8aea9 0xf83254c17805a0a411c8b4b5d6867eada7597d94 0xa41643caf560a1a38a0df32b3229c785397557d8 0x9360fe6a77d01d570c84b014c2f0ee6bcb6053d0 0xa9bfb7d07315b650db42ac6d670f79d836ec2ead 0xb97eff01cfb8750d88bf5adf5497f925b59d72ec 0xbbef3732ee0a70b65fed89f0ece030ac26e73ab0 0x934ac9806506008b3883728cab20dd9fed87837f 0xf8562dc137189e88bd15ea287efdacd7fcc6252d 0x7b2794ef1064b102e2966769a160705c17af33df 0xd71623c25d2504797f1f4be0a4e70e9717921942 0xc00b330f0556ca387d6496a1330e444155a25b68 0x76fbc787b5d608348ec908a89b48573850bc29ba 0xdc4be7aeb107b911b2ceb896a5dbb3c37cea540e 0x57a4f4901461e0db7ae2687f08bb6fe8f296c0f6 0xd9988c2eefcb6488321c5a59f47be6430b0f4acc 0xe740b37daa6426fae84d8ab0f183a59919999541 0xf88f3ae5d9e04753ca0e8cb4b5154552364d0bba 0xe4ef2df4504dbb70a1637fef944430dfdf3d0731