ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-451C35CB37FD
|
Infrastructure Scan
ADDRESS: 0xd4cc4eefb353b0fafc1c37c37d87eec816c42a76
DEPLOYED: 2026-05-04 23:04:47
LAST_TX: 2026-05-04 23:44:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xd4cc4eefb353b0fafc1c37c37d87eec816c42a76… [FETCH] Entry point found at offset 0xbf5d. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.75ms since last run. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x7f analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x47da9c365e31e2de7f92576d1b6d728192e0e22c 0xbb0e6137940127b27779ad716e5e9b77aa2ada6a 0xf74137cc4f3e1ee4e712b9d02335195970e305f7 0x3b97f2c3e9e399b9bee84400a2739739f8b9c2b2 0xe005601766584825ad32165adb99488aa2606c00 0x8fb274a806b900885a4b2080bb059ea62b51e102 0x215e52c0469a5adf5a33b5aacfeed67df5cd32f4 0x67af311698321f5ab1c04ceaf31c96705050dd27 0x6da00d2a2fc334757475b4d45b29e13f67e3ff1e 0x126b97f85871a7a1de8305aa98a2a1acbb2771f1 0x72f749f2f2ad7cd6a437b6e86ce382a699f3983f 0xe357ddf7e9c17b25e7b8f5dcd9a98c42265d8e91 0x8e82344547667a53eb96a1b14b4ddc30374a8f03 0x1ca6aea4a3af16bcd2cc9e56a72972c30b3994d7 0x96bce2d80cfbe88fe41fd2c070996fc66d96307d 0x26577b0e0fef6c5ab2cd5ee52f70bc0193f03500 0x1709ff65e8a3bdd8595a818e6671a48f3a5474d4 0xd63cbd83233c5e499c47f527e576b9a56b7aa5b9 0x69eefcd4921b384cc61ca38fedb2f1f3e5521ee2 0x053ad49e518a0923cff6454a33e97a6c3e09615c
