ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BE5E8471B2A
|
Infrastructure Scan
ADDRESS: 0xc92dfc6a3064e9adddd42c5b9d80d36e0a60cf62
DEPLOYED: 2026-04-28 10:48:11
LAST_TX: 2026-05-05 09:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x6400b37f successful. [FETCH] Metadata hash (IPFS): 93ac7245…d32f7d3b… [SCAN] Analyzing visibility: 5 public, 4 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x6442. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 84% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’93ac7245…d32f7d3b’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x55ec3682cb305218bc1cbbca6897a3d25a5eb556 0xc7fd03ad1f7d1cd5d1b32da8936f7951bba0165d 0xcc3c5a7ec6f335b6626b0fed591f80605c0b05da 0x59ea52d2aa8195257a02ff728ec55dea0d88a8d8 0xa0ad0e65b69fea7958c74bff624d0e1221ba81b0 0x0f9c7f49894e533ea4fe55abd169f0c2c643a59a 0x7c642e0ffe0b764515ab51f389d347cfa8b178a7 0x5143f150090fd1a7b129c9dc54bbe220f9fdc902 0x538979d8b9e87da1aae5e6e1c306626bcbff7302 0xed5931786d1c3900a1334a7b9bdb6adf04d86ff8 0xf24f99795d1cb1f0816101d4e0a41a84b44ac8c3 0xd406f183b34f3b303824f3f0ca694e4954aaaa1b 0x3711838f0a8b51448072ffb7c562a059e04fe8d2 0xf036fa35cf4d9032a091574cbe1ad825d36355d6 0xd5963478a44f7ecfa97c7e78ac2f7907e38611a6 0xaf8e2ead599407ea0d20e135c0d88408d8d07849 0xbbf5e8b1debf4a3649888426c8b10a42eff51e78 0x81b7e4eb283d6876d3677446016a002b8c8b0392 0x320beff1eaec88ca5606444eb718e7574a3b6f6b 0x634508424b5d76b58cc7d178983c6ee90798c173
