ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0186091B03BF
|
Infrastructure Scan
ADDRESS: 0x2d95afca2ee30d7a27231416b6ea2f419287ffd4
DEPLOYED: 2026-04-22 06:19:59
LAST_TX: 2026-04-22 23:47:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x2d95afca2ee30d7a27231416b6ea2f419287ffd4… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xf709fee29a99ba93387b3b0f7e3e71dfc7ef1ee1. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Gas optimization score: 30/100. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x823d2522b04b5a555e3f9a4ba42932183e2b89d4 0xaeef0563bc9d60397d17220ffcba0b9e5ed0a3ca 0xddac5751973cb215ea2aa2a656ac1c58a4f473b4 0xbb5848fde79147a8a4641b0692b33677fb551ca5 0x30e3487607bf9c03763030eebdb4c45e07f331f6 0x66bf182da24d03e1a75c5b5475c3fd0b5ffdb547 0x4e6b0bee73a80a2b995e7a4c120f57a0b07a4e74 0x561e8e71466730c64f21adff0b7a5c19d6b201e5 0xb6b9a817e23657c265badedd3412c71e7d761250 0x7b57f8e368dbd1d552d2ba45fb33e3459bbaf8ee 0x3ec30edeb6c3e2adc85d6837a2fb1855abf82674 0x405fefe9a6a3179947b24cdfe19a5a446790944d 0xf86293976cd78f0671991abb5f828b948ed9f5d6 0x2302e1e1c375a4e4794868767ceb4f91abd58ebb 0x09911e837d265ce2f363f4d873ac1fc8d4d41df8 0xe097a4ad957633844448b65c63614a50db70308a 0xf013a4738f9ac6d36f1f6bb86546844f1f495f9b 0x2f4c1c40157dc24737d25f0f0c9bbe5b46a3ac9e 0x4c230881eb5404e2ae04e390e0a973d5ad281c5f 0x24b476a9094ab921a98d61701b39ec2a97434076
796da11b4014dd2f9b49aac57e178322
