ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4F339AA4C342
Infrastructure Scan ADDRESS: 0x96d441f8c8c2274b6803292ff6f3bceeccd9e8c2 DEPLOYED: 2026-05-13 19:53:47 LAST_TX: 2026-05-13 20:30:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 13845. [FETCH] Entry point found at offset 0x64af. [SCAN] Analyzing visibility: 8 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x519e. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-E569C396.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 1505cf010956b4fddf583e33138879cfc7be4a1e92b4f6073b882936120e67d2. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf9b4717151a669270862ff26bc9f29d22f505e48 0xec1e9fa291584e486f2cd2be92a06976d52b4450 0xe01e9ee6cc5f34cf93c1dbc4209f8e485c1a5dfd 0x7efc5ab4179c5544c5deb1d72e401c127d7e8fa1 0x1027c6b663d1ec6857b8b64582dca382a98d0049 0x428cb12af4c99b0b8f5971dc25fdb987dd3f175e 0x904fd14a66af85468378096c70279f18a676770c 0xc7908f434f74e928f71bd3e70c98eadaae87fa6a 0x3a5a2f948e846772a798f80ef1f91ba35ed10f7e 0x2b2c55024a21f7d90ea294946e2fea182bd2ff89 0xf13d2480827b5049888fc72df1520d6c1152fb5c 0x197cc21cbb4618120ee4fb3cb0a1bb4e2b7c6256 0xcb5a08aaf67cc4a2584db1da92130ab85006e824 0x36fa79e0f4efb8608298fec41434be93c4284a04 0xde82ce4386e113f713c283876056e9ce2bd3efb4 0xcaad3f857b06e839bba59a3270ad2d27bd2167df 0xb4d1592e12f0385c6b484aed22a6482832b4bc7f 0x6fd9758091f4e242035dbd000b6df39454b0238d 0xe73d70f7cf158a0f886acb961e2591a832782498 0xd3a27dcaf29ec3d2fea2aa285af62bedacbb054d