ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4F21889FD618
|
Infrastructure Scan
ADDRESS: 0x8f66337a0c2a02202fd91dd596c411cf977c6060
DEPLOYED: 2026-05-07 17:06:35
LAST_TX: 2026-05-07 18:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 1880 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x8bda. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: db96 -> ca84 -> b887. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’89b4f61d…3633060d’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x30cae384bd699463f32c221a47c608970f9dc0fb 0xbd76c4e8e6255ed742fe7b98dedc72e2e8af6d1e 0x262e80e63a900664d2513b7910ce665ce7738998 0x7e1fa8ae67eff2fd178946a9e486fe8d92783f85 0x31bef366f1d49dc81edf4612c52aa4ff3babf459 0xe7e577600690a04ade409fb3e22c3af13fc60110 0xefbd1251a204ac9cb924fedc8475184a0f63b157 0x987c1b01913b6aa36514ab0ae8c129b80928cebb 0xb4f35b1a20ecdf122ff48cb3e80b750c59ed30ee 0x73b597f6985ffbad2c8e84a449909c7d318ed434 0x1cf7f2e6a4e99ef7c0739ed893b67bad006c38a8 0xcf1ca8f3b2d82715fd7d20fd223a6af6a321e991 0x5684247ca31ecbec7f74f090fe1d424b1bf83d9e 0x62913bafd48325ef61c71b4d0d656aaca01399e7 0x99735e588d9d49d45cce1f4c1d7041dca0f3ce7e 0x114daf56187c717e5787bc341e5eb94af1a49b3e 0xc4e2ab848b00e8d881840ac3abeaf8c9d66410c0 0xdcce66095ff9497e4b74cd02b512ea73ffd045e2 0xdb20f867b1bc837a2e53585c3fc03c67b4404eb0 0xe1b86ed6a559217c068d6e5b87d3d0a2af22b6f0
Leave A Comment