ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-596FFC4FFC30
|
Infrastructure Scan
ADDRESS: 0x7e68b4acab2804af5caafebbf8ee18f862a33b91
DEPLOYED: 2026-04-30 22:32:47
LAST_TX: 2026-04-30 23:25:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x7e68b4acab2804af5caafebbf8ee18f862a33b91… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 96 iterations. [TRACE] Program Counter (PC) synchronized at 4821. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfefe435edf6805237e514666d220fd00c04e49e3 0xed334d82ede7fdd54ff28440b5ba9f2526fae541 0x97e7735b129e10219a3292e47f5b3cb759622798 0x7583e1dcba578be64c73c179f288879280c1442e 0x802b1694fd10159780c50004f45828e0eb39cbd1 0xec18671b924c05921932386143487e3c2026f5bb 0xb71531fa5adefe203b655c80e1e16bbe9f63affd 0x79411fcdb438c62099dd29029b44424404179a2b 0xf38be294c68ff29cf6bcb0c4396b8d8366d50149 0x15afaa99cffc9f3de03f85c2bb170d9f1d9b655e 0xa755b60bc20675f07173a73cf385f53fcedfc319 0x60ae0b9a3ab5514e73c63853c673c40afc772445 0x46058c6f93abc74163d88339c088813ff6f1a9d6 0x9ccfeec91d5bdec69f81ea20572e1bdcd2b7ff95 0x1b32e06b354e18cdd120177341f0fbc0e7141075 0x72599a6106f86496a4650c622c689cebb6251b08 0x29bafb34304e6c4dd25829a01404a36b2e9dc9c4 0x18a6cc63e5c4ccce7ff87fbf336fe6895bc84287 0x2d9555cceae853a262e949aad09a5062e2b1a09c 0xba6328ba98ca75cc139d24067fc3dbdf1f2e58d6












