ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2B1FC258B9D6
|
Infrastructure Scan
ADDRESS: 0x2b83a9fc724e10f6e894d273f5fa9bf013d97aa3
DEPLOYED: 2026-04-29 07:55:23
LAST_TX: 2026-04-30 00:59:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x6efb. [SCAN] Identifying function signatures (0x5717fd6c). [MEM] Virtual memory mapped: 0x0000 -> 0xd031. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x1b. [TRACE] Call sequence: 8ff1 -> e389 -> b8b1. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘6fda271af7321c67b8e1d96be182d61ae8da2f9172f8212e0848bfebad7a01cd’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5923873c729c875ab1f3cf404b6c23723076e4db 0x1cb99d9fdc7458447505d2dbab1757bb3855d282 0x67f92bb15bd5b2359867aa4d07240cb9b47328df 0x905a9d30cfe5b2cc46dcfff6b3d6d9b7dc944fc6 0x196af687cbe98bd44a368734000b78ff986d1070 0x03750318522a8685d7d3bb0aff0c68fc9d006456 0x121ff042ecab71cec12be20cdf9456a72a0afd04 0x36ffa107ce341c87b22a62e676259b16aabd894c 0xcddb8cb52b3d8d4bff4d02077e248e9fe06e591e 0x96d05ec88d8c40887427079936c74de32864bca8 0x16abef11ed2ff491c219f120257fcf1ffd0cbb77 0x9ceda3551c86e894d60e5dad3bef3a68287b4bd9 0x9a3b9dce45f2aa65713b482df48dbe8593e63514 0xcc05f2b8f4be3de86c0041a5cac386e9bbf0c75e 0x028f35ded6dc0734667939276eea77ab71782301 0xebd035bcf458649bc6a5add696fda26c72ef6477 0x7ab9cdfffa48385f498ed398fb933d34a593dfd8 0x53652be3bb26df0ef8f01d6937f1eed5699f4380 0x7657f07ef98fe9010ebf4940feff94bd99c68b3a 0x129bd0b4b0c2e11bcd89e1cefaefedc7559f40ca
