ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-340EFE2466BE
|
Infrastructure Scan
ADDRESS: 0x270de2b351289447c23e358d8287c1546119a68e
DEPLOYED: 2026-05-06 04:10:35
LAST_TX: 2026-05-06 05:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x270de2b351289447c23e358d8287c1546119a68e… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xc685e6a06e270101aedbc70fbd04b9a5347bad7d. [TRACE] Debug: e0cd558548ed4df2. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2e87c9e5d5fbe5f6a43b7eb1e293884a47e04006 0x96a305253d65e0309472c2e853aa0051a770f5a6 0x3f76fc4360e8b16e3ea2e35f918c9f3734ea8d3f 0xc3791778023a3bec159c899a2361b796c709a154 0xbc78fab34d76b5361f53578ad8074c529d1048e6 0x2f374ad578c30674430dc638cb943f327ed63b33 0x67426fe6233897d6c7d41fd20c4cd84ff2ba7561 0x26f607ee0324f67e442b1dd2b6ecf36cd78372ab 0xf52fb121f391108741c1ae3f7b2485b27879ecb8 0xee38777683cbc0c95e5d5e5e2506c1fc49bc843f 0x98f91cedcf84a345e4e337dd323fb62dbfb88f8c 0x3e158e3cd926402e29c60885667685e2eb5ea42f 0xa433522e1435f68705e7e282302d44cb03fd3ee7 0x50e45360fd94468f87b6e7b1b861cbe3648b06ca 0x83e5829bf993a31d16f452193f855d4ebb74e9fc 0x05b1a24c05ff87a6c8db588e8aeb54c589dbd608 0x4b696a6d99a12ecb1a138d6a5d4fbb4a472c49e9 0x38bca071c35f302b9eeef86b2e1ec97ea6eb039a 0x8daa1b35cc805c418860b87ba39a1e568e7da3af 0x7aed8801e419a74a2e3dcabdde5e103150ee3eb1
