ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA4BA706B36B
|
Infrastructure Scan
ADDRESS: 0x3852a197295f21e79b0ede23a8a5a05bf0f87fbb
DEPLOYED: 2026-04-24 13:03:11
LAST_TX: 2026-04-24 15:09:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 48. [FETCH] Metadata hash (IPFS): 2b013e8c…4f5fe70b… [SCAN] Analyzing visibility: 4 public, 7 private methods. [MEM] Stack depth: 7 / 1024. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Fuzzing input data for 54 iterations. [TRACE] Debug: 68bf6870d44ebddb. [VALID] Finalizing audit report for 0x3852a197295f21e79b0ede23a8a5a05bf0f87fbb. [DONE] Report exported to IPFS: 2b013e8c…4f5fe70b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb3edabd72d48f2d4c0f5715df7d34d502b1010e1 0xbfb86f7fce6bd6c541df4c7f467218ae56fb355a 0x5fd69336ccfbada555ec91a5a0ddf108447797fb 0xcc936aa64fd749e33622b63ce30e675b5798e066 0x54f55cf0dc9aa85896dc871b0be712b0f4dc9d29 0x33f1e44db47400c9bd6221962712d882adb8ffa6 0x30232d8225e4c07342b1a819eef519859f4a9d50 0x06b921084edb73f369e3c39ec2eb5f2516f80c57 0xbc99e7531b093ba5ea2373954695a360da3d4393 0x668f6c3913b044aa928b6057b278c9c2454e0a03 0xa91230fd8e927b7c055eacb3ce036ee625ed4d3f 0x7408fe2301639cdc07c80be46cb3d95973ec3060 0xc02fbb95fd7c84f3187fd5f68c4e2a91916b91a8 0x0a30ac2000baa486adb40e737998e139d3569f96 0x25fdc44b1f76bb536ac7d4a41e791adaf4f29f6b 0x9577e9f1606ff7320c3ff5e4d587fddc452bb900 0x76277df2f8151860105a224305da60b99ea7d6b7 0x1ce56fd74842859bf51252f4cd991c9f3ecb5c95 0x7485262b20e565c060d9add17a2fccfaa1aa6c00 0xfa047a91e1841b166c9479f9dc51c355db60b2dc