No products added!
May 11, 2026
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8859BE2B450
|
Infrastructure Scan
ADDRESS: 0x239539093ac8f231e9d82c3e9cdc0b77d17f4a9c
DEPLOYED: 2026-05-11 14:29:59
LAST_TX: 2026-05-11 17:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 71ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 1068 -> 3c0d -> 5634. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘be567f372d95a4395bfc12894107499db135aebf61ee46d3d44d74092df824f6’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbbebc4411532574ad897a6216279f11e4363d843 0x828be4ce8b407c54780daa97b40fd9015c009402 0xf5c6b5ebda50420115a6380357c13932d9df66ec 0x687c19e08c4b3b8eafedd8e4646331b4d03f29aa 0xc1a67ff3c5161d39d9da955875b013f0ba4355ed 0xff9e1db30031cb2b1b82e138bec70d7de70d8413 0x25dd07291370ef57af721a5cd14774e4034a7c19 0x03dee7ab93f63bef6187f0211b9cff346517244f 0xa3858358d0192054b25e29b13b8f9b99b983bad6 0x532316ce54df7dd0323d4d3a58c83fb7f4716b21 0x1b522b9d62986f4ad0e7e881bad464b6e7e37317 0xbcfbb915ab2c056634fc606fea3b5e323979eba8 0x28a4cdd9c76962da6bde1c167b1506a12068b0c5 0xd50e0c4ee8d8ed8ed33536486186f590b45c212c 0xa0b1fa2242b184d6b86366065f5f0a946e96b1a7 0x78cd4d99634b81eaaf46b0ab2d2a19b7fb192665 0x5da0f18b32d63e3e393a2a57ed75ed2d4d1baa15 0xe23c999eda983e60201bc7f8952001497a1936ba 0x202b9441afa1d94c176405ccf4c9bf7f239f57d1 0x51c2be2c113955befe4388603385311ebf3cb4e9
