ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3BD4613B12C3
|
Infrastructure Scan
ADDRESS: 0x6d550d55653a98e5fb5489f2396a54be9023aad5
DEPLOYED: 2026-04-26 14:32:59
LAST_TX: 2026-04-26 21:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 73ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 2b5bb659…880a8d5b… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x0a59. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 9.92 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x543c766fef3c8de7ea1ea679ed225dcb5f30045c 0x1d3c7f4778b14a53e50e87dd80752a425eb3b5d2 0xd494c08e4fd2e676eb3ba2f341aaf09071a73d73 0x99e07374a9c9ed8ada51ca5a33720be7cf2753ee 0x116357745b5cae8f01b5748d0d2ffb92e041613f 0x628a483859ebf09003ed7852e892b448a5a983bb 0x82a51ef9c49d276cd4ee4ab26d4b753fea77e3bc 0x39b55715da975e4b645303bb9657ce4496c05cfa 0xc3dcdfb76ee8575e923bef9240cf58a9a7a222e0 0x24393395f59f730d8d4f886753491434f1f2f604 0x6c7c675c713e6159f54ef910ce853e727e2f4132 0xe166ee5d0ec26c404b2d7a761a1479c8dfb60dd3 0x730a709d1d07b24d3b2fef8cd962e98816bf91d1 0x25ea57800cfccc3a921d6defaaf89da6a1d0096b 0xa54835c7b419c71a54294b337c539570adcc8116 0xc0f5de55697d3f96c07d19834232c5bb9b40a3de 0x03384fce0d6015d541260c2cf515a1e7ffe6f2e6 0xc63bfe749df81bcf07ac02f5f2b236c2fefe0ce2 0xc6586400935089191763624a3617501f2d98cad1 0x6d22904806e90fd5c9a019b2c29ae1e2a7b536f7
![]()
