ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3457B885143F
|
Infrastructure Scan
ADDRESS: 0x866ef78ae367ca53ae927fe6f30ce8f2e838d4bb
DEPLOYED: 2026-04-29 08:39:11
LAST_TX: 2026-04-29 09:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x2c12bcbc5ef9680e8992456a4e4cd8bcebe12ace. [TRACE] Execution path: 48% coverage. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ffaf855fdc5f0783724db3853da14824be2b423 0x19e7b2574c4ec1fd9a0a77888411fadfcfc118a5 0xe6950483e859026c4908579bc02232c9cef06f49 0xea2eefb1676c06816c50a48cc6746f8661d05b27 0x28dba3ac410d613f8d01b88f9a4e81985e085572 0xc667df8c9402ff2204f484a8ddbe79d22806cb76 0x5e8c83b4d9f2c251566451af881613b279110c5a 0x1b9c6de4e522a05718ca05cfb2489871c3460a23 0x6e1bb47f2895e84160f61df922e7ff0b656f3cff 0x980764b8616b54d89f7565b1569acd07d2efd065 0xe5d7649b7454ab136cdad48c4214e69a1ff53e16 0x642d7c0c007cb1285671f5a6bfbc6fb27089fb72 0x53a8bd95d14ea998ac233f9aecd2eac1ce09eb7a 0xeaee70906c32762985b393730b6c7167e52fb58c 0x53f9c3c07714025feb8acefa9284d811614d0627 0x69ead97cf588cc5276b44bf70271c8b51648b271 0xbfc9e1ad645a9c0523b36dd56342f18214fe4c1f 0xf3d5d7b9efdbe3d8015d32944fb1ed7bf977d723 0x8582c031841c513529f546b61a334e878dadb53c 0x0d1657135ab781b55e606d28f3162f41bef0ecf4