ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CBA2E8BEADE7
|
Infrastructure Scan
ADDRESS: 0x726aaeca0324a71ba57b97d0d87ab30eda13458d
DEPLOYED: 2026-05-01 01:47:47
LAST_TX: 2026-05-01 02:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x726aaeca0324a71ba57b97d0d87ab30eda13458d… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x3e845957bad07cca7efd50f3c9cb0a84dda14ac3. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3f8411e3853b65691ed3633209eaa9c0420097f5 0x3178234aa34737eec24bbe75aa304cde36ba88d1 0x1628c3f543039998e52a21403b696546068593ec 0x0b12f0aa4b20542e19595d23631a16d51123ea3d 0xfce21881a60dc760cc6c05277f763de39d2e9909 0x1a9b9a33eb400aa85074d41d1799de971df95dae 0xda06157c68c6dd6cbd2a744f5ad3dc1ac4d594a1 0x6b3fc4a2faf3e1387c015653515cbbdd946b44da 0xbf7bee8695f9a17224888c08ac31141f5b494244 0xcc7b8d315affb5c670c8b779d1452b10f366e5c1 0xa9d555cfd497debd0e971b99ecab59d5a48172a0 0x19e7b2574c4ec1fd9a0a77888411fadfcfc118a5 0x4e157626204ac54257f379c6c4895828b8616dcd 0xa45921b07610b046b2e97562cd4f7c749ae5c875 0x0c6c789a375cc4ee9ce6008715c915a91da5ac5c 0x993289c632b12bfcbe4479880c824542f7c22211 0x39053a9bb274adde54fb57e8bbc25323482e7cca 0x62457fa3b0fe81f3697374b8042ec73e8f3b3e4c 0xa482c5184251250a6521fc85220d03ef8a233b9a 0xa67b0d5c199939aab99a3d0b2adb4267d6cc1985

