ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-78DE1EB1CAE3
|
Infrastructure Scan
ADDRESS: 0xb1de071eed87bd51233de3b44bdff2b25767ba8c
DEPLOYED: 2026-05-15 10:03:59
LAST_TX: 2026-05-15 10:23:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 65ms. Protocol: JSON-RPC 2.0. [FETCH] Received 53 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x5f49. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x5f3fa3c56950c394bff189fc38d37684300a01b8. [TRACE] Call sequence: 59d1 -> ff3d -> b058. [VALID] Data integrity: SHA256 verified. $line = str_replace(’13e484a9…fffb1b0b’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8b969afce2678cab55514d8cff89eb7cc8940fb7 0xb576ca3029c8a74fb3fbb7e333c2a044d1fad304 0x5550508afcf84026664d18f1a179000ef4bd2873 0x7302e47cfb2c2bc7314fc893b9dcde2d9a29673d 0x8b3849c997121bb0404cfdbaf13a3e9347fa37f4 0x7f02690e561ed3ffad69d44b11492bd55f65453d 0x2dc808d84994b19e11f3702ab2d061302525ee1f 0x7b90a197a2b6a508356417cd112918ea21c98e97 0x71b2f84b38cb960d57e8a42bdfff12121b9e731f 0x54e438dcbe23959214467596f3df19b1e97d9a03 0x18a821a40222cd20b0e0e2dd2b3ad5eebe2f3188 0x104397d61961b3d8a9d4b31863549f2e29afabbb 0x9e95d862f69d3643c05b6e9cb343388ffa39ae74 0xed7ae278977b89ef9f036a2a853366e4cf71ac79 0xd5b863232f900a6e5beb4431646cc46a3a0ea460 0x9f22c9f070204b6d5919edc7d4e14e6b0b62c4ef 0x167c1916850f7afa8b91743aedaf94de692312ae 0x48b87c3213c2d6d41c9b18da15aed133c734646f 0xd22e41523ed60fde2c40d8d2a2ef348d3a3f919d 0xa87ce1341bcc24671696077c022f5f21586c1aba