ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A3C2DFD49744
|
Infrastructure Scan
ADDRESS: 0x5a4ed71327461a76fb9941c43b224f66fae92259
DEPLOYED: 2026-05-17 14:03:23
LAST_TX: 2026-05-17 14:33:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x5a4ed71327461a76fb9941c43b224f66fae92259… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.25ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 95. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-100D7141.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f08915660d383935f1d0569faf8b149cfab85d8 0xaaa5d3a8463ac66c174997f03a7240fc6a520426 0xb4ea67262bad670c88b656627967170da6bd0000 0xdb0a22a190ea9a5b8bf40442cbd880db7dfacb23 0x152ba7adadc67ffdf55538bdaa876fa30ff61f9e 0xb25500f52e32d5a8239c477c15f9107716131ee8 0x26d1ec523c699d8c9a46177507f1fb165c9d0890 0x9cfbf57353a20d4c3235f9b8c3f7c956a6e8af66 0xb5a89490eab7c9e0747b829dc431420b60221fff 0x4d8e9c3f20a3ce734c7d3b638dc425ebcea22660 0x5b7f77db3bdb135566027a7aef81a94e7df876f1 0x8118b90dd7357d66b1a4e3efe1d45777da5f590d 0x8c12fe738f40a702dabcf5ee30f78991aefc7b39 0x377fe578b252e88faf1895f2d5ea9aed19726602 0x6ddc2b456e6e1555ee6444154e702e9f17355b55 0xddd3011f15faccb113cf6c770e0c0bb0a4ce8a07 0x815588017143fb37f789fea0ae444f2ef7646edd 0xd31ee4d48d4545af29f8623790afca459f929a42 0xb18151fab5a06cf2d0cf8cce6ccdcda5107d821e 0x19bd9ae8fc18b40eac980e127819e52eff27078d