ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-445A2CA2F550
|
Infrastructure Scan
ADDRESS: 0x740beac27698ffb3f3f8e43ace96b2bae3ea6784
DEPLOYED: 2026-05-08 03:19:47
LAST_TX: 2026-05-08 04:01:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x740beac27698ffb3f3f8e43ace96b2bae3ea6784… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.84. [MEM] Tracking pointer 0xf9031be3 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 81. [SIM] Gas used: 38109 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-096257B6.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x15776336ed750dbdefeb9c832f4afeb465ae4bb1 0x50f21d9cac05fc883e560313300f2bc5bf525dd5 0x282d1f4b0bb1214590d903eb4bdd0f31f228aef7 0xcd933863b46e58c9bc437b5eeab6fdc33c380ebd 0xb6243583a8c74c973bef6de9e8526ec881980db1 0xa433ed3c68141777caad6994801ca549ee0a748b 0x27046e373dd90ccfc5e3f05e0907b242a1797be4 0x1c893ab919cb1ed5f3d98c0a6169e912152263f9 0xa74b0ecb4fa312f827fdadb0b605ce2b7c4b9b43 0x9f4c2350fdabe836f7cdba3f525175d984557bb7 0x07aeb9d96696708de983d2055e55269da016aa71 0x68b174b44bcd1af949974424da6758ee57dec94b 0x1a3584fef9f501261899eeaa0c665ef5ae929a8d 0x2526076d5234d0b3418bd83039f50044b353efb0 0xad7f53f2a91cf1dd55d53ac32199115751dfe808 0x92bbfa1c9d5e77c7eb158135d3dc832126e0892d 0x3f58698573aa8baf894ee023cb744dfe4ee29474 0xa93e0cfe08829de22aefa58daf3576f768106ecf 0xd50678f2763db502e9481f39315702aa7900198f 0x5f1914e974c75fc6f4e6ca4c1fa4e8f3912bd27b