ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D50791D9A5B8
|
Infrastructure Scan
ADDRESS: 0x620307db683ec2d4bba26b2697e62c4c85b977a8
DEPLOYED: 2026-05-13 09:30:35
LAST_TX: 2026-05-13 12:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xd3b8a9c4 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 70. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: 76ea724cb36d21db. [VALID] Consensus reached on node cluster: 8/10. $line = str_replace(‘1c9eaeb86946b8ee0edbfc6a03a00f2194463cf27ac7214c1b7dae0ca73630da’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c08d7af4a7dd180e711169d2a335e480fe759c1 0xce816663918f51cb2c0ae509ecabc423a99c95d6 0xf4b7d88ba08fb86b77814395cd1b044187c04456 0x226f697c217826efd490ab4e008d734b017d0615 0x94764fd7a025a34f9c147dfe813a1d7581f1cbeb 0xf92ef2f3332ca06272adb720698923952b6c4685 0xeddb7a0142700f0ab5f976e3496334bce9bc9540 0x1b944b4798711574945d8156940bcab1a5b0b0d9 0xc434e7fc685b8caa1055112db55d044b2ca617db 0x4e4f892102255de3e56335644585e517d20bdd6e 0x2fcbe9bd99f297926246f9d05ff8488cff6d1978 0x3175d0f9977d422032283b8f9eeea3a745f8ac89 0x79746fc3275e2ad36597ae0a721de01da6878a58 0xb1fc7f71091c408355dbc121a0a6a7138d518ea7 0x64463cc9f86ae837a78fbe466e7a6bcbab605c7c 0x9334cec3b718d282d7ca67f245642526e8f25328 0xf1415ac260940239fb9883c613c043242cd47ef9 0x81f557bd8ef6f4d4ea4fb55e303048c28b71527d 0x36365a37f733ae63c9b8f954e2e658b3d4a5abe9 0x2235b24fd0e54edb9a127b4470e75a6de5df0875