ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-48429D87CB08
|
Infrastructure Scan
ADDRESS: 0xa1aa29447e7782d5e6e5314a214d0bb3e79851e3
DEPLOYED: 2026-05-10 17:28:47
LAST_TX: 2026-05-10 20:56:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xe46bf19d in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 9470a94f…1fd7a99d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7120149a498cb290c4cdd612ef60cc023d8592d0 0xb94a0798cccf6e4f63d2220a678eafb2bfdeae82 0x636915338a2f5ff0f332636be44fc124a9842a74 0x686451002c16d1a6c0925a4fcbc4001f07ada0a8 0x4d56ebc93cc2725e9ae99842f8778366d8312924 0xd0dfa938a0bff8eaa91e5c3ec97cffae1546eda0 0x98c807bfbcbce68a0bc5f7510a5deb9e2ad8a03d 0xfb7a6277a117507fee8bcb6b602ef0ee7e792d39 0x4fbd0d7e78fc3da8c78552b31288a40ef09391a6 0xe97f5cbe8bee6521d7f86f7ce4894bc5944c3e1d 0xde2a70bb985f2e29408aef90ae58b2d8afa98e2b 0xa82370c79da68981ea7a990bcacd1c5fb4c075c5 0xe7b4de127eb1330f938b9a0b50cbf830f30dc19e 0xe180307ca5e81acb1f274a3abde6693469756c5a 0x7e31679293d682ea5263530f453eaa8ca8a892c3 0xfdc38ebb7cb7326707ae7cb51b2ef4e949c65347 0x6f797de1a94e0d58bd4afbafbb109550eeabc01b 0x419d3a3cda03d35f1da2e4a5c35af96f1235ff15 0xc08ba6bb0d65972e53d7c3a6ace4d4bcac4c8351 0xecb179794b74143ffeb2b4e45de747cbf4c352ef
