ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3C45B30FF6C5
|
Infrastructure Scan
ADDRESS: 0xa249c95eb62dc9ab5501950fd270cc317c082597
DEPLOYED: 2026-05-13 15:33:11
LAST_TX: 2026-05-13 16:12:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xa249c95eb62dc9ab5501950fd270cc317c082597… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x2286. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7e1cb652ab3b2ed01ee415e05bba063abfa4f8ff 0xe59f1bf5fe1b84a510245bdbfb698ac5d1ad18e1 0x2ed2901d7a6242a0946c3a49fade5cd55e8492ec 0x3785d9ece2c3d4edf80e7620b4db69772bf03dc3 0x13f0e09272e7d78f398c017a943440336afc34b1 0xebcf073b8188ec8339e4e6e1482b4488b24cc180 0xf6789657200044bbcceca2ad178b06501926e1df 0x1f2352164ad07ca20c2da861cc48313dc1e43237 0xe8e165e6f21dc7d82df7413b9b5e998009e40331 0xbb051dbe7e909ae4eb9b4a1ade68fd5207d2223a 0x01890d135c256ea92565c7aaab1c772fc225988e 0xaa5731faae47a38f7f836db9d3ce2f73b3ef18d8 0x7eac934b6aae73f10b42ccffe14d826c1a688032 0x27cfe7255247ebca8521ae9c645cdab0118caf4d 0xde485e2c89862f86950533de3749e63c2fbdac8f 0x499f3b0db19b11bb4c82113404ea2bea636f9822 0xc36e928c4af933b0e961c09edae63e6ddb42104b 0x691d2e665ce618ce39b17bb97b492582d263ef3a 0x6f272123f12cede07f54b6032a99041be7049e26 0xffd1a9da9a20cb5a48845a49f1f61c30e5614d11
Share via: