ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B89FE763E2B3
|
Infrastructure Scan
ADDRESS: 0x96d441f8c8c2274b6803292ff6f3bceeccd9e8c2
DEPLOYED: 2026-05-13 19:53:47
LAST_TX: 2026-05-13 20:28:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x96d441f8c8c2274b6803292ff6f3bceeccd9e8c2… [FETCH] Entry point found at offset 0x333f. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x7b7e22fc… [VALID] Consensus reached on node cluster: 7/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb9693f7e378b1d4717b7d059ef63c829b32bb476 0x5019dfc580b60fd618d242f50c9be79ccc66b6a5 0xcdb410f82a18eb3b090ca2fac9bacb774b26e7f9 0x81580fdc3f4b5323f4860d789c7ba290991afaaf 0xebf8e797ef458a73e00c8275247a47f52072a579 0xc1a66b2913e2754804d775cef69b6b22e5febbf9 0xe0ecdcaa74c8dbdffd1652ed4b2aaa1e1baea72d 0x0e307d76182dadb10a8df39f36f19e84d435716c 0x863974c7182733e34f78fdd0604a9f3ccbfc5fb5 0x2c50216da4012b9009db0f0bb54f512b7d6b44ea 0x4868dac9a03823fcbe157d4b70ceaecb171bdd28 0x287d38ca1d89cd3c435a8279ac9a3528ddeb9131 0xb8cce04f96db5e5a3eaf7e2bd52504fb32bd1cec 0x3f0e7b04d117351f828f4bd783d65f258ba54902 0x2f0c637edfc1fee123503a1677174b247a725c99 0x8eb5b5b7c06d02518d4c4fa189f6857bb5ca08e0 0x51c47a430a8333ab37a423d1798e206bf7ac103c 0x19c55e9d3a59ab0b4f8b5d47bc85419c8f275a7f 0x5c10341b1427019ba567007dc8e8a8b6dc7d684d 0xe0f31d87e7cf57c8c3dc2bf2506b4bbf872cefcd
