ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FAA2BAD85016
|
Infrastructure Scan
ADDRESS: 0xb0603b41f27f0bfefb7b7bc28ce158414df63637
DEPLOYED: 2026-04-28 02:24:23
LAST_TX: 2026-04-30 11:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 12ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0xc891c692). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘3ee9fb6a…5af2c614’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf4772344feac0e4b389102929948149f4f677a96 0x8023f2c1e3ce5f41f6d418630e8ec7b05cfc6a5e 0xa886e70bd15e90e2fd36abdb9b54d014bc97fa12 0xa7a0cf7cd6f043fca23f29d8ae5aae6b46e11c18 0x6eaa8a505f5d18563ef6881a4fd7811f4b6b9dca 0x00db90929f823995a208ece530171fa9d130492a 0x62853e8bb6238a5beacae4fc19c3df75bdad3c17 0x0b05e4a3f4a3788c75979beddd2127054121fee3 0x80135e08a2f90124d4f4e6a43bdda351d5f631b4 0x49c2ebc101fc2cfa76fd1ef354087cddc43655c3 0xf88f892c682ce269b7282fab972d81beb4730eec 0x13bdd7841f5d86a867856b932b3927a972e4f46a 0x6ae5f3343017b36a0c5e6c197409aafb94b7f794 0xc0bb18ab5ef0cebeb6fee4edcc67ce3e3d2448f1 0x831717a6682f043fd78e71e5f4e4135376afd209 0xf5e458a4c0d9f63377fffaa18239268cbb7df375 0x705302dd95d0f5b489b5ba40ff2017ab12315889 0x4090a4397bee48c2465cc5d1e3728010b8189490 0x09626a6b06d062440f0dd4d91322a0a5cca852d3 0xa58f59ec104e5eea479bb7433c40ca9c5763f712
