ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6E3E5889212B
|
Infrastructure Scan
ADDRESS: 0x4c0b10d3bf4282609f36ae5620491f240d1af898
DEPLOYED: 2026-04-30 18:28:59
LAST_TX: 2026-05-05 13:42:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 52ms. Protocol: JSON-RPC 2.0. [FETCH] Received 33 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xfbd22d5e in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x2e analysed. [VALID] Finalizing audit report for 0x4c0b10d3bf4282609f36ae5620491f240d1af898. $line = str_replace(‘1EA777EA’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x37d58d764e664c4b76633acab0e64b82bd5a9760 0xba498181606581503013929c92a1d5d5278e6364 0x9118c6257faa082d64280a3d404a4297e6148c36 0x85334c7748fea00575550ddbe1cb2a639ef86978 0x84c215560c8fa6a4cd4f35df9876c9bb3cbaead9 0xca8b32fffc68d2c7e6f95ab25f01e45327e935de 0x040f79f35f7a3f49b809612d2fb3b7fe158cdfc5 0xcd755df59073dac68914cc9a23b141e54cce1534 0xe3b147829be51f1fc0192a35741e785d9af077a8 0x61381121ae003351838de7720d488a624cd28e7e 0xa93ccd0d08a7d98b778ecdd2acefaeaa69d9027c 0xf855beafd068717307ebf92b1f763e5cd4a0e6f9 0x5bce5cbd1feff4d893c260d1d650430cbb9bd66c 0xc31820ebde4e8d02ddfd70ec46ce522bf759b674 0x25a1f7be27ac46b21dfa7b6a811c2ebdc5e65a13 0x9628ba23bf68ab899df81c539c00b71f0b62d536 0xb46c5355b6f4bd2ead11d39621001cccd19b9357 0xb55a70d3a4a6e53ac80808f36316ae3abf909c9d 0x08eec8d4653f7c9766339f87890e9a07868f20d4 0x0e2715d8a3c11083f9b04025c5c64ed441c0868e