ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D332B4CCA48
|
Infrastructure Scan
ADDRESS: 0x06a645079cd4f3bb38ffad47f92180b8041145e3
DEPLOYED: 2026-05-03 14:40:11
LAST_TX: 2026-05-05 11:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 12 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0xdd5e. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: e85d -> cc08 -> fff1. [VALID] Finalizing audit report for 0x06a645079cd4f3bb38ffad47f92180b8041145e3. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcd1ab8aa4212dbcfc64bd25d8ba77dbf68551e2b 0xbe9c082ec423918c3f50743d6435207c295c0c12 0xc4675aab6866e42052893299bad90a3249fb133b 0x6ed0eab02dbcceb52ab329a4eb5f3d458b3c474a 0xf20fabe33e16621497d6e9bf1155fba8418fac02 0xdcce66095ff9497e4b74cd02b512ea73ffd045e2 0x8f3e76ef6a831d57ad965bc05a5466a54035aed3 0xd9b3e7fbad9ae732c0402eec5316fb8f6d3c5912 0x5455355626a57a13695aa05eca95d4bdfc8f7257 0x228067972c708ba4e7a486ca5a28a95d9f83532a 0xa61937350a6bae83fbcd99f4382ec0771ef3cdc5 0xfc20d52092e12f7efd6af0cfd57f7fa01eabe41e 0xdd004414b396490cd9b40d918662dcdc62c8c972 0x5ebc9394f0ce3b64cbf0cb2ed69edf7c7ab7bd9c 0xb63310555059f12e910103f9c60d251cc8cbbd0c 0x47a83e38fa9c49d4bfa956bce4068f46c4fbadd1 0x45ba09341734aecf90eb400aa87c807c65e118bb 0x78733f72b84c866ac7aae482dd48048570e2218f 0x8a94a7029fbce5fcbd7251f72b5995b1078a723f 0x5058a6b8a07ba7622a247547731e4fc6e3e94e76