ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BA41AF5C0D26
Infrastructure Scan ADDRESS: 0x2ed526b627240971ebf316d60268c0dec824e354 DEPLOYED: 2026-04-28 17:36:11 LAST_TX: 2026-05-03 08:33:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0xf18dc08f successful. [FETCH] Entry point found at offset 0x865c. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xa769. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 31 iterations. [TRACE] Stack trace saved to /logs/TRD-CC112774.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 6%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa055e852bcb07353ae0d3f1748e6fd742fa95763 0xde44c213f0730e9f38401daf8edf31129de80681 0x68d811f71c49f3a06f15db5a23b43b26c2fe97db 0xcc33b965fe03c9bd194c13a241f0718d210880e7 0xa78846573c4eda142dfe10335f560a5cf3486894 0x0c6f8a4cbf778233727574c7a2f405f79c6f01c4 0x3fec7d9de5c4ece4048faf5332752c1a649f1b20 0x23698af4bee75b66fc29473d9f2101b844786970 0xbad1de1636c095bb3be9adf38f0e4d07fb44c41b 0x1dd262622be153fbf8e80c4577d8e62d20880047 0x9ebe68d706a82a78a5c1afc118b287dba91e1c32 0x5363a157b8787e00e6ba590d1bb33f28d62db7d7 0x718c65e567c55d34bbc02b1b4ecd5212435b1aae 0x14cbc8dbcb6460e06942a61596ca4f2f57f59326 0xbad76c59569a933fab0ec70d7d70fa9df6ea245d 0x2d3f9abd1364c4c6a99df93deb9af62a80a8f63d 0x9d35142810bae3c529cc45b31969a5ed6bfc4f5d 0xd7a3b08abdd9c538a0cce8b0a6b8b025426a513d 0xfefe435edf6805237e514666d220fd00c04e49e3 0xbac9799f77c56ce1873b6a1cc545b69a0d20195d