ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2B18E2B995DF
|
Infrastructure Scan
ADDRESS: 0x56cf85a5f3282a6c217cf40a1e060e08e78a1935
DEPLOYED: 2026-04-27 15:38:35
LAST_TX: 2026-04-29 22:39:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x56cf85a5f3282a6c217cf40a1e060e08e78a1935… [FETCH] Hex dump completed. Entropy: 8.68 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 42. [SIM] State change detected in slot 0x6e. [TRACE] Bytecode segment 0xd9 analysed. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb9dbb394b6840294495d4560ce69a44938e60225 0x07b00d861494e8e4531be40492a29b5594d70d80 0x593aec0b5856420cb1ef45a05385de526d814cba 0x204dd274f265f6599d7cc8dfdfa519005a0331bb 0x159ab90c6f586e56ac31da1d59eafe14f2d26c45 0xfc2a2b57dedae735eae526fb671724e5f8cd956b 0xfe67a4c304894922d90f69dbfb1be32bc1b689af 0x1eebb2fe9344f2200ee888415fb233b7fa65e977 0xdd83b40c1577cb49a0dad12897bd289a3effadf5 0xed0f0733081135f6f37018d00ebaf2d6415dfb4b 0x17248f55eb721ac5ebd00871a57edb03eedbfb85 0x0d926227bebc2c2118c2197e00bf17a62f279b74 0x94f6fc547193cc1286cb451cc9472b987ad2bf02 0x0ad843dab3cdb0dce46fdd8e40b5240a29c3a5bb 0x99bd684940e7e7701bde0f0bb69c39c8c26b3dfd 0x9680abcc067a1c14b60d2e43aeb395be7579e846 0xe7f22f52ac9fc9c82ee2e1c40f7a7f035e522c27 0x0e902cf3da324b481f2c03e4edce81ad7eb72ff1 0x2a6fbd8ade54533463f65d62f22bd725796be9e9 0x8b287e76a6523d458a831e1a2d359ea2a1bbc42f