ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CEB44F44E167
|
Infrastructure Scan
ADDRESS: 0x1cba1c2753338ffc1d504ab8e6e22778240a32c1
DEPLOYED: 2026-05-14 03:41:23
LAST_TX: 2026-05-14 04:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x2cd35002). [MEM] Tracking pointer 0x1ae05d0a in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x05 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xda002ff5d80cb063d4711d54c0abc04260552b6f 0x1f62e359635b07856068daaa87b1dc2b85c87787 0x6ce174bd27d9beeedc3df7a9c4ed9597b75ee6b8 0x34ce044bb3968b5f280ba42a8559409822489c32 0xb97eff01cfb8750d88bf5adf5497f925b59d72ec 0x3bbe928340c61a65cb6c4a87b3fb59b6f3f7606a 0x2ec740dd560fe5981bae54cd578d1eafc45209b6 0x2faaf836b823e0c3c0cbe71c0de7f1eabbade7e7 0x7e1b39c7ce31fa30a62e729802af89f9a915632c 0xe01765d614e7a76ba78fa0a4832efff2d149ffbf 0x198cc3157305d69e543a9379ffe456bf7cf2b74a 0xd80a3c870cf9401cf3ef9df7037d60e60ad5ea54 0x9a19dbfb15ee8f56319d9859c37456e8a551a9dd 0xe5f33d935520132ef8fb6f5b9a390d0f65c075a5 0xc8b3b985a685acc6eac4d1c8a5609de950f647ab 0xbc90262c66e7c33de63ff7583f303e0985035d99 0xd4ee2ac2ffa605df3f34f6ad202de12dd9fcc124 0x0a6c21174d039f5d85da93fcb3fe7ad5f5f5e827 0x1791527ebb628209acfbe3ee65fb3158a833060c 0xc810737a49f23220a9aa69241065135f683cbd2d
Share via: