ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B2D1B3B20FDA
|
Infrastructure Scan
ADDRESS: 0x9a2008f18458b69817062b196f3e7acadb80f783
DEPLOYED: 2026-04-29 07:53:59
LAST_TX: 2026-05-03 07:37:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x9a2008f18458b69817062b196f3e7acadb80f783… [FETCH] Received 12 segments of contract data. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0x3274. [VULN] Warning: IS_DEBUG_MODE found in storage slot 76. [SIM] Reverting transaction at PC: 3684… [TRACE] Execution path: 32% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x13e2393958d7d3ded9d3daff8734d9e8ab695839 0x4fd164ed163d9a92b587e0ff48a641bb929bc9be 0xbc3116c66223036284c027716aff6861e1b87726 0x0ca17bdbf7a4000be3a4284e3d62e6f3cf73a541 0xd76b994b6e6350bc298c836cbb58b117496e49e3 0x89b4bd57fd97d80dccecdda020e4a1742fd9ef49 0xe18fce011341868041e025c60912591700a04b0d 0x371f5520cc34aca330523d4a88e21a6535f0e67a 0x1895c820b1746a54bb640525402a767fc5499d39 0x1992f74f068c032dfbb072f4d9a415f6ce5a3511 0xb96822b3fc615e42f3be87156fb22aa1c69a67aa 0x80d27c7a55087a421eea76700b583636c1f1cb26 0x38a018943e260e52ff23a81bf37f04ffb74ac60f 0xbde1ddeb54bddab2f806e32bde62dc1f04de7cd1 0x5831db0ccc8b165e5531104ce99acb86eda3f86e 0x856f9d19a3269551d1d96cbb48e2d59d47eaa96f 0xaeed9c34fe844aea4238eb10eb1a9926129aa2b2 0xfe946b6fab996a5a9e531b37b07a7b1a1c21ca70 0xc011566884879bd947ddfc10b1b1c5cfa6e51477 0xd56e2febd99db138fb87d42c966b12b92aecf4bf