ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D5DFF7C63969
|
Infrastructure Scan
ADDRESS: 0x9d4ecee1227c02c02c73ec798d0a3c33ff86d26a
DEPLOYED: 2026-05-13 16:02:11
LAST_TX: 2026-05-13 17:47:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x9d4ecee1227c02c02c73ec798d0a3c33ff86d26a… [FETCH] Received 71 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.86ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x2e. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb923b1177e0745b498761b618f230f49cc3ecb8c 0xeaee1ece921b37b8f9ae92fe9c619cd2c84ae7bf 0x12350d371742deb2460f80c4027c9819a8c07e2c 0xcb38f16ab9d14e8965a3ffa18c1d7eaeac2f6b12 0x005da6de3a47330167c948430b5112de76d0ffee 0x182a893b967e4131a093c516a3b43884e8a0705c 0x888d757fcacd0076da435917f3ceb6803730d5c8 0x72c60343bdc8ec5afa4c073da70c21c0169cbf25 0x8b8b6107e08667159e64911bd7f6771b190bb97a 0x508883ffc8403f12ffadbf7ec1877c03df807789 0x79e8f4bf8e5241564657a608858284d7d0153b75 0x4edc66f96bca9114dcc4e5c52792b3685a40203b 0x2f0f545705199990626e787fdb2c91a825300845 0x19f9fe7cc731080a03b86ad1dcf3357eefb26b84 0x702c695d755bf1536f0a6942754052b2f8486b05 0xf96b0f0c4faa86201dab40c9fe6eda94fa89f861 0xfe1dc0b4d573e337791ac44446e49cfdf3a1bc12 0xfedfc73bf26d72566285c0a94d74406d9baa06d7 0x6557aa1e73457eb2f92f1edb4d28e871e3ae8c49 0x2d8031278e5a5b0536a9a16d2ed245bccd5a4e25