ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-410E521C99B8
|
Infrastructure Scan
ADDRESS: 0xc8b17134ec36db80182d2260115e0216a60cc557
DEPLOYED: 2026-05-13 21:38:23
LAST_TX: 2026-05-13 22:42:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 64ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 9779… [TRACE] Call sequence: 013a -> 95f1 -> a9c7. [VALID] No critical memory leaks during simulation. [DONE] Log signature: db3baebf28a3d656eebc1eb8a409151b13dd11f90045ea5746a3b095963dac44.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x67ed85de672537808db45bef823e19621f127240 0x838b5ae10d272e0670fec9d1585caacdba185f14 0xbe487555e32a964989b8c3e38caced607b21d6a6 0xf335c6db080e022f23cf4a7093386f2663f706f4 0x6e8c0921338506b40051affcce5a34f28a609815 0x142a79c4e7940f843424251f266dcddf3dccc4d6 0x8cf2466eaf9a884824a3fab7e0857baec346404e 0x8d80d8e6645a92ba7d9ab587ea6bb477e0a1842c 0xc66e480ca79b418d6a22f6dba98dfc51ea31d02e 0x996374aa83163fc6bd980e3ea026d9211dbb36c1 0xf25d80628c3bf1170590953e9caa2b6fb410639d 0x0592ec62e38f9a36507d502d2a07e66350dbb20e 0xcad47bdb4ede77a738059eba3b33c7eed7024644 0x6502fd30f6ea0c94a71fe579f4f312050d323354 0x4e42621fdd634a9069dd9ca8b7970800bc8d3ec1 0x5abe70e56f2d534974faf28a144d5f7143012148 0x4320d3867f16842624d23d875e647797d07c5bc6 0x7d155a2dc7459b3c9da3abe48af8499aef276f5f 0x57dc9da6013bce022a899e5326bbeff3965c80aa 0x018ea8d2f38f696b2d201a01e5cd04f6272742b7
