ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-414289B07011
|
Infrastructure Scan
ADDRESS: 0xae42f183554d369ee98b7b1980bea3761f47abc3
DEPLOYED: 2026-04-27 15:39:47
LAST_TX: 2026-04-30 04:02:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xae42f183554d369ee98b7b1980bea3761f47abc3… [FETCH] Bytecode size: 9868 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xaf16. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 61% coverage. [VALID] Data integrity: SHA256 verified. $line = str_replace(’13c15c6d9346b5c862a45038c043f4726c67542337a7ddc99eacd862fd60de71′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb83938e77ebcb61d5743429af8042f64d2548440 0xa61c0fb28def90c94cd694c7eb67a6e78b99c80b 0xd7d200fc8b6b3b098b1a4ab9d491a8ca94cbdd83 0x8932a90b56dd2f5a62ff8ceb60ebe4e27ceca535 0xbc5ec6c49adda43f052c0805ba39ba6e7487bcc9 0x14247383826798954adacb5f460f7307c9765cde 0xd9619a1264415cb3ddeaf521bff1b470011e73a1 0xe356db6ee6a46e32087f977f5c75e52350cc9c23 0x0e67f4c6e148e79b84a16579009c3bc0d8579a34 0x1aa23cdfc941f6b54251c72012a9bfa4bf5394d6 0x0583e793613c38c43ed5fda52d6306808638a011 0xb119bff557fda359dcc66267cf76698015a51775 0xf860bb0ae190296877fdcdb35ef6fc0f5e488631 0x8df1c3e25543ec9e471391f7030bde854170546c 0x145192495c86a715b181776a95188e418f07748f 0x913ea29f93780b76aa9f34314179c153bc95484e 0x62b1113fa653f02aea7111d24ce7721a989904ef 0xcb05789a494b69f71855ca14cf465c749e50d9c5 0xff928c3e0255e89252ea98da12b89cd4028c64dd 0x48057285546c5c693f5da4ef150ceaa706e0a129
