ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4C4BA55532DC
|
Infrastructure Scan
ADDRESS: 0x4c62290aaaf3567a7e1f46b903b9d444a8cb14e4
DEPLOYED: 2026-05-08 16:51:59
LAST_TX: 2026-05-09 08:04:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x4c62290aaaf3567a7e1f46b903b9d444a8cb14e4… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x3ced. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 76 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Signature verification: 0x16fe0d2a8c23207d05f4eb3c71d895312b5cb3cdec0abee6691f569e39ca6816. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90a1c94e750be2d204885ef8bdb081beffd039dc 0xff006b51ebbecd9565a0ab1c9a5bb3139f8de3a0 0x2294a496af9056de8a5d63203d468927ae76ab0e 0x545903079a2b0914dd179fbf77207c98a2d90115 0x1adee9e48ee6afd0ad0ad340a47d6b2b0e725e12 0x3706326b91a303dae6bfd1f34371f8619848dfaf 0x762ab4091ef74483796618d264a6c2819747fc78 0x219c20e9913ed86fe9e197c2b217616a6f12ebd4 0xd76a76038a9d1f3d47c44c624572dcc5a0692017 0xcebee2c7b4682dbf802bf3850a6439ea53ae13ff 0x2775656d64033dd4d6adda53c5781c24d7c86164 0xe76278619dde1f71e5f8547d8af9076a76c1322d 0xc1b6e5e90394cdf21f1d79539690f83c3dadc20e 0xee63910a7444bc2f60d1052d740917587ced6cc5 0x2dd2f94b9b70e31d76f5acf80bf5a87234a30bda 0x680c9e800a9c8ea5494b6fceaae717bac48022f9 0xb68e77659f900da50cd05d051540d7bb334c1678 0xdf71da3f2f01a250b523158e5b63b4556c4f30ac 0x88175d662f04e3ff9e2a7f1234b44322236df401 0x652fea37711270ca5b789e89850db9ee0f1fec32
