ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BE5E8471B2A
|
Infrastructure Scan
ADDRESS: 0xc92dfc6a3064e9adddd42c5b9d80d36e0a60cf62
DEPLOYED: 2026-04-28 10:48:11
LAST_TX: 2026-05-05 09:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x90cf6eb3 successful. [FETCH] Metadata hash (IPFS): f57b9272…278819b4… [SCAN] Analyzing visibility: 5 public, 4 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xc0a2. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 84% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘f57b9272…278819b4’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1b8ff120bf202cfb73d02b5f5f6af07bb1e7334e 0x415250fa864548f4245991aaa29dc74d2672aff3 0x83faf89df15a29f6773dfb2085370a9750f364fb 0xdcda7747f0267d7dddcdafe7d814ee0180e2888d 0x0fb5b236e7e30df8986ece2fc3ca82aebefa6935 0x13d3b27c7c100621cb3b714deab858ee06d41db1 0xcbe40f967e7fd901063a02222ca946c7624b2c7b 0xd118219f6636674ccb03fc5a8a09df4cacd8ad3c 0x13981da32dc632bb9b38a1241e8ff460860eb552 0xe7e2093c744024eab747c15ec60f7b0d79dcc55f 0x5ba0b57e7a999cc13fe2fbf2401b6bfdff84662b 0xc57c3726cd3fcf70bb82bc3d8e7680673e36b9c6 0x70ffaa2be9bdfa1e12073efabe3ace9312088bde 0xf12e29d521788a13ebbffa407990931d325a7955 0xb52907e241642c3f6266bec85f1ae1a3ef1b93a9 0xbcfd83032de47f6de465e99d18500337ccad4e24 0xc4fcefd1dfbd9ad7f3aa514fd3797caed57620d9 0x9ef8378741c26b8ba13981a9749e1b9942fdc9e7 0x0396ec5155ab78b4ac0479d1b8bd6c3db8c4c21b 0x49dc1f7d234faea475ab74f75ccf00c873200f2c
