ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BD30684F0A6
|
Infrastructure Scan
ADDRESS: 0x72bb293d4d14877b03d712275432dbc3cc1c6b8a
DEPLOYED: 2026-04-22 07:18:59
LAST_TX: 2026-04-23 23:22:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 81. [SIM] Reverting transaction at PC: 5439… [TRACE] Bytecode segment 0xaa analysed. [VALID] Signature verification: 0x3d57dac6bfd17dd3ef31e596053d5c08d4275d408fb9a6b74f4b33f9f82b572b. $line = str_replace(’83a3178f…383bda4e’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc4d0505c3e5e7faa75b2afcfd9ffb0730edddc3f 0xd77dbd15dc0dac524e7c8ba0f490e47328750c66 0x96e26ad99420848d47fcfacede518a0906ca326a 0x22d510e7702b18e3d2ab08ab6edaa2bd402f5a3a 0xd53c379355f3701657c831e547c288786d60586f 0x4b46b2fcb587cc708a54bb5bc2eddfa74a6878c0 0x0d3c40b1b3547a67d3769d74618b32d838446be0 0xa9c646e48be74a15c98646cf197450df3aab5dd5 0x242a60b68481f836887eda6849dbae76890f8c3b 0xb8a6a483b903f00cb7bf4bb581332bdb413a16d6 0x05feba1e86be720d4de3c2206b6aad667a4a45b3 0x6884048c9cbb614c08a93828de87da36c19b1ec8 0x8a1ce4dccd3e053c7997d198c4c2997922c70cb4 0xada40836961d02eb1aaaf40ebdbf283429f0a1be 0xc747d47bc1aceb102ad6b90839f77d42858decc2 0x1405b6f2e1b923c7b5d5585ab9538edb9e297da1 0x4806015e7cdc5e3054ca6039e75a024e216f5e83 0xd7e8fec378b20c4e02e5597ec00ac1b7021f7ca9 0xa34f516bec0ca8f4a15a5ac293ff1ad7434f2fc7 0x2b0a2ee41b17210042f4cf4ecd8d45e7c148cf05