ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3CFB196A457E
|
Infrastructure Scan
ADDRESS: 0xc92dfc6a3064e9adddd42c5b9d80d36e0a60cf62
DEPLOYED: 2026-04-28 10:48:11
LAST_TX: 2026-04-28 12:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 37. [FETCH] Hex dump completed. Entropy: 7.88 bit/byte. [SCAN] Detecting compiler version: v0.8.13. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Reverting transaction at PC: 2333… [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Finalizing audit report for 0xc92dfc6a3064e9adddd42c5b9d80d36e0a60cf62. $line = str_replace(‚0x54cb1160712588602ce35be7090466258a15efd1‘, ‚0x‘ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf2248684ef59b72b24bb7ee3fd6f772e75af9bf 0xd998f70f59992d19e42121bb520c0d1bff0252ef 0x20936893704d697f3bf7bb762be45022a1f7e66f 0xb8aec52d3abb81d4abb3062722591ca96ab583a6 0x37ff219e6cf6b72221cc48ef957762f78c98ce91 0x3a8a7580e0948ddcb55ccd05ce3ed6b87e810340 0xc60f4ca68671ff6ac3e7dbe3819980863604e0c8 0xa55b2bda3d364a8d3056baf966aed00578a6367c 0xad00fba3864df51da42d26e357ce51d5045cead2 0x3f64f216e72cfa881bdb9848765594abc2d0281f 0xe99d5f0b388a0b287d72fee063061e9e72bb564b 0xb418735e7bc16bbfc9bd412ef19580cc45188e68 0x1d1946e1cc50545c2a10ca7a668444beec83e5c3 0xd22a379ed84b1832d46cc7ae3fadec6bf3c569fc 0x699c8877d7e95f01bebc637b845f4710e7eabae3 0xdf6def3bccd9328d4bf9ea9d625b41d0fedebc4a 0x6e156d84f91ea0a5b53a3ab9635cdbfe418cce98 0x184087132e945780673b43684fe0b72e327c3040 0xcc936aa64fd749e33622b63ce30e675b5798e066 0x0e1a3f4cf05829a25d5675dc6a3497eee50a312a