ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-79923CA2A638
|
Infrastructure Scan
ADDRESS: 0xcc07aeb7c7f2d444ae479e444e40dfe96aeed9f0
DEPLOYED: 2026-05-14 10:21:23
LAST_TX: 2026-05-14 11:01:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 67ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xe0015d02). [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 90 iterations. [TRACE] Bytecode segment 0x9b analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc0b1f54fc7231bde8a7c967baaac4f1aa4286e02 0x122e9b2a99d06ea683fc7fd53feb1cda952e17bc 0x784f153e47a27de967b3f5350ae21efd0d29bf81 0xe14a422f878afaacf49b5062bd3b42a8440bce20 0x1b5ca6d58efc07d53e1249a091927cefda5a9305 0x389c909d0c765c0d8a25ed6fcb4eaf87f80c922f 0x60075ba915171a7876d08f66fc6763e8e3db59a8 0xfb3bec9757c6ca44827a1d9f5e5826d2257f4571 0x0f3ab0289038373583dada2ea538ff0b959fb769 0x41f6c9931526bc453a76bf4d0b964089beb66c40 0x5aaeb4ef617e65d877d5c35721f244c66e52b325 0xd1993ddb55af73452ef776571bfc8767261a2e04 0x5fa1dad7d70da40bac1fb613fe7df169f03c73e8 0x1bd1e21553f8897681550d7fab1c1e9e6b7ae602 0x5fb7518e0da792feda4a0c2317e85224138502da 0xeea57dac37b285c475c64cf1fdf3b78679d63e16 0xfa956a80a271b64bc0ac423d412f9692dc99a92e 0xdc7c7a8c0f6ce7d2a3b2807e58dfd14c2332f75d 0x82237f8de3ff2c1ccabadd6c9b240997b9f345fe 0x1fae933b17a423b11abb4e9f684728f0ca97c38a
