ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31D4C6121EC1
|
Infrastructure Scan
ADDRESS: 0x103b0be5bcff3b3290415b86ffcb986504fb2e59
DEPLOYED: 2026-05-16 14:01:11
LAST_TX: 2026-05-16 20:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xad38529c successful. [FETCH] Metadata hash (IPFS): f9fd1c6c…e6bbf6b4… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x88. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x729113b732ea6b6437b18267f29d316f26baafdb 0x6fb026c92fa381e22b2b33dc7c1c6621d2f5ab45 0xac86be3cdc632c7898c8c4d73070711b8f30b458 0xac32af81058fe708697dc4ce714b3921413ac8b0 0x1dbb959d2876e86f9f504dc695bedff832ff5332 0x88927d23aec002f384b3e69f184a9a5955d487d0 0xf20efbbe17e401bfe2764d4df6f8f2818da13e3c 0x87220aab0491ac73ef36ff8531f7a9f6ddf01a6f 0xca4c59c3a6c20d5f8d17e2a6ef37262c91964e26 0x862faf5e124adbe79f5a7ad05fefa3e64f6c198e 0xdc246c03c12e4e05805957af1c2d18fb1a831a67 0xc82f1091f2f8499f9a850511d2e5060f4032704a 0x7feeeea4861317e3c410e9fb1d6587e31ec37950 0x7efc5ab4179c5544c5deb1d72e401c127d7e8fa1 0xe61e6c30a27430e744d2f46b74249ebc307c24f4 0x1261609f7506754c6618568089fa7a94e3c1504b 0xeac2a87ff5bd49d4ea85da57380a1de2e539beba 0x3f3e183f8ce0c2e3ddb7945e70b0f1e41c798276 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e 0x9a8f4258a102a7577379581b2ac7a6b650ee12f6








