ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC42E9CEA39E
Infrastructure Scan ADDRESS: 0xabfe4e6dbcbf1468e6e50c2c2223a91eb8c43b18 DEPLOYED: 2026-05-09 05:56:47 LAST_TX: 2026-05-13 17:59:35 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x3ef9. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.24ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 70% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘617FD3E7’, strtoupper(bin2hex(random_bytes(4))), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2d4f423e7183c3c41eb97b726185a2583f94d4f2 0xd2cd7a59aa8f8fdc68d01b1e8a95747730b927d3 0xaa44fe52501f86284c73abddcad9c88d01a8edd4 0x484669f9709517a99423d186658696e956219e98 0x5681927f3f7783a10f4368ddcb32ba2fc4267497 0x5cd3fb43a9af9bd74922bb70390155f2a9f98f08 0x24ea757fcf6190f615ef0d660e3df1113d0ed013 0x8c056ad3f7f7f1a601e6b2972c6eb7e211b863bd 0xe907fb4c7faa8f6ab42a25810b520e48b5d5ad8e 0xd6f57f40efc3c903c75eb41648eefb9b7db32ba2 0x698943ea32ff97345bcaf8e7d0929b61e55fcb1f 0x7aefe99a0d71e33cc2c07fd4a951890a2103570e 0xc21f40648b8e7714b7e9933e33a42c403a3031be 0x8cf2c87373284ad141253cc9da451097df2f08e2 0xe6ec440021f73eabc46bf62559b4c02d960ea61f 0x98406448782e97c5362aacc85a4a254a73ba2f54 0xe9264bd3fe05d28d8c522c99bc208637a172d39e 0x76e5eb399a483f65a6cb967a5920fb9f2b9a6fe6 0xc1cfa8bf737f9a7a5291ee98737f705a15854914 0xb8fb6d7e7cb7ff5a726c5d66506fee8991d9a261
