ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5FEE6C88A690
|
Infrastructure Scan
ADDRESS: 0x22b3228cf75145d311484bfbec764b5b5f48e2ca
DEPLOYED: 2026-05-17 00:50:47
LAST_TX: 2026-05-17 01:44:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xff6c. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 99549 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 5315. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 657b6fa3…19c0eb1a.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb1c3779e4a579e523aee4ff6c2d15d2350853da5 0x2a73d5f26a182b85c15cff58071720bc2dc2738a 0x7b8b52b3b99817d1075221cd9bd25eb1db13b4bd 0xe23a3e5671acf36a767520d72f27af67927325de 0x79001ec06a3b48059a4fd4fa5b04a270073d1dd4 0x010b95558b8c41f54aed6bb45bf835d307d191b2 0xdb4a029b9fa6e5ca3e785eafa3c1991a64215204 0x1025bd6b98141ee4f8f9e494858b199635962775 0x570ae36a0a814ee52c677c5f9b910a3e60c9a2fd 0xe218384ba6cdb46fd7ffc0f651076e1fc998a0f5 0xcfb212cef7c84e1f5700d759ceed8eb4c6bfee1c 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7 0xc91dd80016175c555b24a97284132baf0a754210 0x31bbf600ab76e3da17b391d68b08d793fabd7747 0x250d6fda5e3bd4dd2f31ebdeec146f67717d7697 0xe0a6c83d49af0a4c04868d62b93c80cfd13df561 0x0eaec4a53916cad90a6dde73101ece24775f6f79 0x45f011336a78e997ac6f49f8e97d11838b595233 0xd7755d814ef67a22be9534d076014d9d7d1bf410 0xd618aab548933f61b9f010314c17031bd3488bc9

Recent Comments