ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9EDB6F839521
|
Infrastructure Scan
ADDRESS: 0x6b079d7371a9fb00b7e985143fc4773fff06d63f
DEPLOYED: 2026-04-26 22:54:59
LAST_TX: 2026-04-28 12:16:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 11633. [FETCH] Received 47 segments of contract data. [SCAN] Identifying function signatures (0x488fbced). [MEM] Tracking pointer 0x06cb66b8 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 1396 -> 13dd -> 241f. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xebce4aede2ad590d73e41225517749c5017e93e3’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeab70f4f2a71c8c1f2d54e02c02a8241adb4741f 0xa823b5d80c79ebb076d3a716e7fccbfcec867547 0xcc6ed2d85bc17626b42cdc4b7fb9c6e05ea268ec 0x322aff4be208a20678d7ebd9913a48339823f269 0x298c983bdb33e9c7561f6c927511674f9fe34ecb 0xcd406cbd329f853c92240e69d5611dc0eafa9314 0xd853b7de774342e457a533c09a62f6e13e840325 0x3848a840da61c8beccb86a58e2e59f4574801f39 0x19e13903a72299ac76b21025941052f4ac0f4c32 0x9ae014c782edaab4d9f51b08de678107dcda6514 0xf9262b9db9ac4b4b00ead1fe6b02a349ff7d27d9 0x1b1dbb00ee89f729a047eda4b7c70e3492cfa4f6 0x8a325e3a844f6343e60a4a61340b8330d5541f85 0xb624554893854f704d4b655db30ab02ff3cf02fd 0xa56f29e64f7a1fa1aafed03457dae3fb6751fcb7 0xfac5df3e983a32e947c4e53e112080e28de6bac7 0x9dfb9deb279c33bb0fa6c941859326cb979c7c19 0x2d483da1399c03862da82f19704f3ebee782f0c2 0x35adc3c5da478dc09c99dce508b8dadf8197c260 0x6b26c52345d70e2fbda9ec76e12e970c6996c432
