SURVEILLANCE TRIGGERED: 0x49d1c6e8816648f96decc121492673fc1444baad :: Operational Security: Trace-Log Interface Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-519A50DD3C32
|
Infrastructure Scan
ADDRESS: 0x49d1c6e8816648f96decc121492673fc1444baad
DEPLOYED: 2026-04-29 22:15:23
LAST_TX: 2026-04-30 08:02:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x1743. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x32dff45557a5bb71fa58de0096692208dedd3281. [TRACE] Stack trace saved to /logs/TRD-AE3FB06D.log. [VALID] Finalizing audit report for 0x49d1c6e8816648f96decc121492673fc1444baad. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6d59ba94c3793a821dee36bd2873a9cf3a85ef26 0x6b9996781c323c4ba86131a8ae7d0071027d4078 0x6d0c44edaad08f99be5af7ac7fc08ce0827cc130 0xbb5bf4796805fc92c0da36f3ce3b67cd8cb84593 0x61b92931599e2f380ca6039cad8468491ea92dfb 0xfa4af1510ea21e4e89b4d419172d601de0e2661c 0xb70facebcac99cfc9fad7df3ec1d5653553551c0 0x74e03201a831b737ba389bbab4816fd27f7a1c90 0xe7df08cdd442aff69fa391e655b57110e26af23f 0x38b44d1e1307b4f486dd6d22ae60d71f683ddc2f 0x93bfd8be2e30ef67886ba660cbd371449815eb7e 0x72b5d07ad9bf0c7ab3d9514d28739fcc0035193e 0x9aa946f975083ba6c653dface75a977f5a65d5fd 0x7afcd07894e52f9146c9f954c8546d8d83f80043 0xc4fbde373f9c86a142cff93c10cb75325572d77a 0x6222eb7520508bc61b74a1365fdfa91e9cc2329f 0x21f47467d757a5b66c9cf70a58ac8afbf44b5646 0x4029d9725cfb59db2c634f2f54d50f7cfc20a429 0x5b2f72e4e130fe104e141ad42bf8b5d9703a2b87 0x229bea4dcc67ab65700b057e99da10dd6eadddf0
adminkopisan
0