ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F86BE29FB828
|
Infrastructure Scan
ADDRESS: 0x4043223f17a5c4e20f8348befa6a8d225189ce32
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-03 08:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 34. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Execution path: 41% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’83b41b91…0d104415′, bin2hex(random_bytes(4)) . ‚…‘ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x88e212f73fc8ecc6f460169e5b1d56246288d103 0x5822b5c3473c9a685591509f26712cfd2fec3342 0xf2b1230130cc1a8dfb39a5907be0738c243dda81 0xa8b1a05d9f15801f9296e543e618ca97c7106581 0x5190242290f97c2ac6f44e863bffebfaaa0f48d0 0x62412c2e9363f1761cad0ab4a9cdab4e9d487bdc 0x90277d207fa49176c7fc6181e3b1910e68b98732 0xcb2311edc9a996541bd3445cbb9ba721a3a2ac9d 0x5c22911cd0208d7665380ae6a6ac25dbb0676ee3 0x88010a96748efee711439cc406ddff33c10c079f 0x16e02dfc17848a589cb99937d36a05af14d94ed1 0x64857605bad2865e68332ce5820453d7ca531e22 0x69d0a690f71f7bf949ccd7a8cacad32e9e0e86ba 0x3683004e5b642459a0efd16c72666cc882c679e8 0xf264d8eaecf0c62ab298e505a825d335a335722b 0xbbc516ad417405d9ac9c600b374f9e1234e96677 0x475c8992cedbbf0aefd5fc013e05cb3d1835b87a 0x2fddb4eeb8c2fb8a2213b5e888c98fc8209f89e0 0xc86fb55be993d54e2e9da9d594417b9f2283a08d 0xb51e94c6396433ba9774573f4fa7a4fdff4dfd55