ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E4DF8AE53751
|
Infrastructure Scan
ADDRESS: 0x682e45677465819c373e0b912d954404873430a6
DEPLOYED: 2026-05-16 22:03:47
LAST_TX: 2026-05-16 22:54:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x682e45677465819c373e0b912d954404873430a6… [FETCH] Entry point found at offset 0x5310. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xe4a5. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 5027. [VALID] Consensus reached on node cluster: 2/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x830c15e4d220fc61ecff0d5962825fd3fa12baaa 0x225b1fb9ce57a7ff69f160581e74da4ec3a5afcf 0x91fed9db0782ad81dacb4e70614a7b7a8e324d6d 0xca8a78628fe9f1c82714d66dfe16b473d000b179 0x2d1e4a40e4ee208efb4ba2b5c76cd9a7f852884d 0x3dc3ae67a3df50d46efabfaa0804f50eaebd2bfb 0x6b58c228dfd579a9c2ac09f5b0251d9f9e5c49a6 0x7a4ae815d561d267a0695b0fe8fe7f01728ede18 0x516d16114ea66bdd41a73f46b86a27ebb3de85e7 0x670a9f7a3cc23812fd9f81e4a1722fbdf2a74c7f 0x21cff039c1fc4fc621923db18d8e4ca746c287d5 0xcc744342ab0981269469ccd53a79c36af4679470 0x484636da1f632e8e94896475c1bfdfe0c46c15e1 0x77c38547ec5018c9e323b9a14b9a4ea53226acc6 0x389d6e848f6cd21ca415435789dcbacc2a523442 0x01df9c0c3f36e050d0ef967683ab8fcef581d1d5 0xa6f043d88686674b97cb617622510b258cabaa36 0x196cfc7c1656da0cb4721922277f8f3db8e6e1fa 0x49a3478529735fc9f59347947cbac72205e1c04a 0x1f61bae3211e327d26c74cc42d73d6ab17b05b52