ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-86CBF25F82B0
|
Infrastructure Scan
ADDRESS: 0x5efdf0a3b5790d7a12fbb677fb99f5dae9c2df68
DEPLOYED: 2026-04-24 12:25:11
LAST_TX: 2026-04-30 13:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 19ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 6.70 bit/byte. [SCAN] Detecting compiler version: v0.8.76. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Execution path: 77% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‚5DEF6273‘, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3ee8d7684f94016538eaddc6ce09fa5f7efca455 0x7290e486c09293aa9b63347716845d011666cfc1 0xf32f161e6d9692cf906ed7fff4690ff8faba2fdd 0x8975aa869b93f04a2b4de9d49947c56af828114a 0xb8e946cf071de67fd05e12f7658a762b4e80499e 0xa763b00ff1b95c0b72bb443a6a66ca548aef0e5f 0xfc64a9c50e58cace6c737ac1de71aa9a2c30820b 0xfd93a78147d48ad633b15c256836083d2f59b6bc 0x3228cad6f9ac001cdb0fd91a3884829cdcd3775d 0x56be79870d5624b90460f89f51a8c1e108b2b304 0xcefe19fb9a7e7f5a24a4bacd23df0120b80f1934 0xda870d2763ae0ed0c9bd4112f5022e8dab3f0a06 0x81167c2752d6a0d34e753a6c34ef292373777e28 0x9031fb1250c003c325571b78b7c0d1aba2ff1e2a 0xd26b9821e9e1651e37798c0d69231c347e85b457 0x859eabef702fe78bbf8c695024804cdb73c55c67 0x0ef5f2e789de7a9834b185c7f960f3dc404aefdb 0x39a39a3023f530695823709a1fcdb859d873738b 0x35009855eafd49bdac3ffbe0d90d614b16938e9e 0x871756564d5ee0f7b7a99f216634bc65d38f39ff
