ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF3E92B63010
|
Infrastructure Scan
ADDRESS: 0x479b166765bbe1a29da6ee23c840c1a316f0f0b2
DEPLOYED: 2026-05-05 06:25:59
LAST_TX: 2026-05-05 11:22:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 9779 bytes. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Garbage collector: 0.52ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xbb. [TRACE] Execution path: 53% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘1DA57966’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa91c4490cc98ceffadcfcacbf7175aad432c813e 0x322469241bef5d17c1920540bf02f5ef885aab70 0x5032bab384b5366a1829352152bf37c15d90d598 0xf24486c169c59c6de14a52f546805eb555594286 0x9c8aefb643e538043fe624ff6c2a7c803651292d 0xc4da43a5acde16f07059b141965f5088078758c1 0x6d7d7e93dfc513dd1c22a636ef59d69734473367 0xf1ec6acec9d5459515c538618eb6b3c48ae09ae7 0x390feac34248f9fdfc70c221d004b364032cd51a 0x38302188fcb9e55c91720ba12f1f7b242db6531f 0x7880287a177e060b7024c730833090a8670b2107 0x128bafb38ac4718fcfa75ba7fdd0e91d250f6d9c 0x6ed0eab02dbcceb52ab329a4eb5f3d458b3c474a 0x76dc668620a36d91723a9d365ed0365a6c4ca62f 0xe92ecc70fa4b0de7eae734feadc927cfbea98bdd 0xd50e3f04046cb7dd8881040eba5902ebe7e477b5 0xc5c5afdc824f4ba82be3ca526df6bdf52ca34748 0x61b00760962a136125930ea3b424d7b219f2b922 0x31b5a566d234c311627ffd1b0841874bbbc16840 0x96a7b1dbcb9584320e3f525615671c6e69f8da80