ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-34344840DF89
|
Infrastructure Scan
ADDRESS: 0x17e35f74c02a589aa0e5122cbbe1c6106f9407ef
DEPLOYED: 2026-05-11 01:54:23
LAST_TX: 2026-05-11 02:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 74ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x1ae170df). [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 59 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 1AA574D3 finished in 38s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbfd2816ec520812822be25e207f3891f929df7b 0x8487533cce638fcd6b9d65efaeaeb2131e68f721 0xad527bf09288cece3f2b38baf661874dfb8b70ef 0x88d268370a0bdd862bdc023171663fd76414f02e 0xb9f5bd0ce576b478ecb71f0cfe2e36fd90b03fdc 0x798b308a8993f16fa1118f312a03cbe3fbf82cc0 0xf8259536d0ff7db61dfe2959aa318f109adfb57c 0xc48beb724a8cf55ed7b0e058073dfd7dd2725121 0x69f27962329ccbef719557a0002a1ac6d8f941cc 0x9deaf831a30ada08140c7614ff3fa99e37218743 0xa6701fbe7d45fb5ee7b9f91451b8f4fdfb3b64ec 0xfe48232537a5c46e2b8744cc55b602cf693ab1cf 0x7c886c50c5c0ac7acdeaab7c8a0d9104d4ad6d52 0x465344d13460d9506466c685a87ff732280a6d49 0x75c0e21fa4bdef4cbe3c28a007d853e7b979f7ad 0x2f4ad30566465e6c370605674d3d2d8956bc0f53 0x81769b99af51c5aa464f2e4fd014a4c677746162 0xc39e5bf40b0eaca880563571bed9c36965237c4f 0xdce0daabe8cc0f956f9a23194de50127c5a82905 0x86d27132cd752a8b7ebe22fdd62ee95a6cd06a56
