ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8471EA3EA25F
|
Infrastructure Scan
ADDRESS: 0x4c8911e473106d22287029b295f721581b160bbd
DEPLOYED: 2026-04-26 09:41:35
LAST_TX: 2026-04-28 21:37:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x62d8c2fc successful. [FETCH] Bytecode size: 8738 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 057c -> 69cb -> 9f57. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc1adf703bf2b77062e037476525516b92391515f 0x9120bf2fbbd4bb7d2a58564d72eb884a6b21f147 0x62be06786bca70c1c40acba32658f0c83aa83585 0xa19dd5aca21b1c4ba736f50c1a5a9a1726e27d36 0xc1111570593c7447aacda19ecb8632f8c094ae28 0xc4a15f48d08435c72ec609cb62cc5a00aca723d4 0xd71e26ef589f6e8cdbf036f8fae35efca87016b7 0x4a179e9cc5c4948e15ecd55ae7c354ecc3180705 0xc1807ac82f076303b60bd52bb4fb896f9f6afd58 0x2db421e17a29fefe97d7a1e47ec2b08fa4b3e8ea 0xcae12f88bd22c476a635cde9dd8efedb60326488 0x2ffc51cd50ec4bbd432542a18d2b5f41723c84fd 0x295af9431ade8f1a7065b6865db0859d4d16c62e 0xca181a7ee5ffc37abc76ac400d27695b295dbf12 0xe0b6059ba0943f37468638b663c53f996b6bd1e4 0x7988946445b15a50d8666a3e8987bf5c52842421 0x38e37b2cea4f8696e4643b480e5e8689f27d4978 0xa464df2ac8018e9739e8709c9926f7d64dd203d6 0xa17e8a78a83fa194e17aee2aeb55c5228ccd860f 0xe06ac4d34e881df34eff1f69d44ea73920d0a6f0
