ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-09C3B3569F4D
|
Infrastructure Scan
ADDRESS: 0x55f4a2bdd16e32214d5488ae3e982a6b1ce922fe
DEPLOYED: 2026-05-14 06:28:35
LAST_TX: 2026-05-14 07:52:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x55f4a2bdd16e32214d5488ae3e982a6b1ce922fe… [FETCH] Entry point found at offset 0x81f1. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 56 iterations. [TRACE] Stack trace saved to /logs/TRD-BB1015DA.log. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 4ABD9990 finished in 82s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3a870b0c865fab3ecd9833bdc96d06f7e6e3d225 0xb468ec67e6739e616695695aebc2c4f1bf42df82 0x57a73117f62b866a5c7fa37f734f8821fcad0dd3 0x7a1254d97ceac75f5cb5e311c37ee8b5e8dbe14e 0xe94deb47d6014e2feda71e577538e08f3a949555 0xacceee4d5ad3a6125eb6f49ebf163a2b54dd9476 0x427142d790bfe92cc51f600f53f713f503310e6b 0x36c193d8487799227238b17a75ded23808b836ff 0x1e60a06f2c04f6569f7b511422a2bb73acfa4083 0x4c2ff165eba1c1d7b05b873053f657e89133b921 0xc5592fb52e1cc87c8125aa413a5e6c32c42f75e2 0x7c083754788ade01b23a05fd563dec07c23df7a0 0x337673d8bb555c7f03537a281c8f4fff733a0080 0x82772dee3ccf097b06a459db31298de7f8523e58 0xa74bbe995f73f900c7ba1e678c8f2ed1022613a6 0x04a3ef9135f82768db3233dee87404591a17fa06 0x638666ad27c44f3fdf55976d16eb004c69dd193d 0xa305792ad7ffa99a673cbf5ce12c39524308416b 0x46eecb295f5fd6b3f07b3a16bcaeb3d924f8262b 0x36d35536b6de4d5141d377166e2628cafc56fc1b