ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2DED1AA09223
|
Infrastructure Scan
ADDRESS: 0x1ae01b345d80aa1b868eaf5cee37608a941810c4
DEPLOYED: 2026-05-11 21:55:47
LAST_TX: 2026-05-11 22:21:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x1ae01b345d80aa1b868eaf5cee37608a941810c4… [FETCH] Received 80 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x4d3e. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x8b. [TRACE] Call sequence: 3bd2 -> bd15 -> b2fa. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘a3e23ef8…c0508648’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xad348f0a33e26e62bc50f7abce397e7a86576205 0x037724511b076daba04ce1e14e7d2445d26d5534 0xa1e662bd7001c33b2773c454770bc9070b77b4c5 0xc309a28658feca0e4d5d26964b28f69d23b6ec03 0xe8275e6c9ad3e1b9601f3d867ff9c7c7e0c0a250 0xf681350514753fc49318be529b9730a98f322952 0x414ab0fc2c9221f8bd70b85f2ff5c61c7ed98cc3 0x9d19ba947a6bf0334a79220279454edbbd2c04b5 0x51407137ea804d5dabfedab1b6821bebf3ed1d8b 0x98a59a699a7f4b0e9a2acba1e0e3576ec7871945 0xfa60789b78a7bebfd7475104ab9b223b7d7e4eb4 0xa80614aa42b84cdac816f180052fbd66afc99b2a 0x2a80cdfb5751f27d18ec0ca41cb78cdccdcfd605 0xce4a5d11fad8f04d76eb65a588dc6a2e2a734255 0x292b3f01fd11749ab45de9db258bb51a1c14c470 0xd7299f97fccc70e0fab0d10a69af4f4f89e73a37 0x641da5613a65d45942b53381e3ce4e069b15b2a3 0x157e35f9cb1042cac4b5dcd5dd02d3c654dd2432 0xa816df9fee674a48d6b74448681d2b573df50587 0xd777e701506a86fe89f07f963aa6c08d6905cff8
