ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8254126C7EF7
|
Infrastructure Scan
ADDRESS: 0xb3f85ef5a814793fd620b922393d71cced24a842
DEPLOYED: 2026-05-13 04:07:47
LAST_TX: 2026-05-13 08:59:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xb3f85ef5a814793fd620b922393d71cced24a842… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.86ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x1d. [TRACE] Call sequence: 52da -> c02c -> adef. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc763873bb5509b6bfe0a76a902207e41f2aaf340 0x3b8093f87fd3c878b5f1bcd71812c97e5b75858b 0x01ed78f479b9fe3feefdec36aab6e44ed15b1516 0x1dee85a7d4f9e19975f816524b9d029faf82c68a 0xcfe5c162fe332f6597219db95a9d05f7cf488296 0x97784d7079a2bbbacb4e7382b2001111aedbd0cb 0x6e3c1fb4bd2d6938b4da9b3cedd0d14894040dd4 0x57cea43996ab1ba58abb8cd030c6103aaf36f497 0xd5a11fbd560b71b21f7106978e9b4ec13e1edb3c 0xd4c5bcea8b4da57201bb9187ab1c04fa1ac58b31 0x7e0d5342e16beb6b7744b48f29764cfb5c41a3b0 0xaa8a237a4f162e3c4cfacbefea0736c53d68a54b 0x7eac934b6aae73f10b42ccffe14d826c1a688032 0xbd6d03ff3338a6b856dc3c1a0b06194ce0248017 0x6e182f934169552b92e07d871d9c1f8a80403f5a 0xaa99ee88544f7f17d83da063a45135fd6229f7cf 0xb68e77659f900da50cd05d051540d7bb334c1678 0xbc38d256e559fed3fa95a6cdc633c667283fb6b8 0x03eb022d7d1c3f7cf6b0b2bc7f49b50d81da8726 0x76d1bfc4d6cd4490cb5ec183be6fc7a695c6df74
