ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AA3837B277FC
|
Infrastructure Scan
ADDRESS: 0x2e4725f2c1507329678ce4a9d88f22976233b753
DEPLOYED: 2026-05-02 16:54:35
LAST_TX: 2026-05-02 17:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x2e4725f2c1507329678ce4a9d88f22976233b753… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x907e2c16 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 13 iterations. [TRACE] Return data: 0xd6d131db… [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5ff6083eb15a56de85d0b70a20662855223e92e6 0x1de13e3a480895b8119b25f3684e284f9b077d0c 0xe9506efbe5f1cc3b52c830e8c229a54c227e613a 0x1306c164b38bc74eb2aec66d618047137b8f40a0 0x1a7453503e401e2b29fec8308b1d99ac1c90d874 0xceebabcc704a4723dda4c0ed19f04e017b704a54 0x895306c218d8c2709d0892d8c8cabe8b4b8a3a4f 0x214aab090cc95122705a3d3538662afa43e75f13 0x0846d51f36716d1c004833e3dd2525ec9282abfd 0xec3107be473982de0c89f5267bd7356016a4b5ab 0xb889a559b9736313d71a951495ef1206eb4ba36f 0x93ae266202ef1bbcb78a86742e20c708d514ad67 0xc5207c35dacf86c82c13f6dbdd4cbcfda33c52b3 0xd006fc83ddb12579cb5b807fd0eb1f34b2a6068b 0x9a263bfdfe3d149a2d6dfc665073f45395e5a214 0xdb20fb8bef846c72d0e308ba6293cef09fb02e0f 0x1b9730d762bec2f0ee3404e839d0e66ea43a238b 0x61eff8b59323db12f66cd5a48e90215b45383f8e 0x5fb001863857593ad049362aad7b6b533b895662 0xb6c7efee5aca6ce90f17a8cedf3dd797ca7a0cfd