ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D3A76FAC1DF2
|
Infrastructure Scan
ADDRESS: 0x76b855fe3f910ae205a1d0043877936b04ab2817
DEPLOYED: 2026-04-25 07:27:59
LAST_TX: 2026-05-01 09:53:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: DEFE979D. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.71ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 74. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xc0 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6b6b3e91f1ec0a9e0b8a3efbdae73a0a61cbc5ca 0x8be4a947ab5384421b4e96a8d7be7bcd196759be 0xec4fc630985ea298b2aae1a84c2bdc71486cd760 0x1e3f02c620243c87f47c015c9cfb9bfadf930fa1 0xa2e0773f29bcde172effb4fa2cc6801ad6fc1f98 0xce963fdbd0468c532218c6d7b7ed3b4f37c171d2 0x39296187a875a7bb14a9b6cdd130da3f9c54856c 0x41c62a9932e55f87654c79fca6d211dbe037b6c2 0x67da76cdda30dbfe1a34195668c54f83e44920eb 0x534fbe33015ea5ae3d4ceba0a51987cf2c84f801 0x4ad89cc3865ed3dc4f8dd727e372ffce9098f3a7 0x4138609a2699b5543668beec2a114d9d8e61a1e8 0x92aaf38c0d954c0ecb254f8dde2c43bc823caf7e 0x5d71794f6f7b771b6d06ed5ed65b013289bc3ed7 0xd24b208505f320f57ff426e294784027e315a92a 0x04899e1b42f626a9cf7d79686a3c2a72cc2ec63a 0xffb60652b4c5bca2fba27962cc80b98d3387b80c 0x25382fcb5fbc6473ba32608395812c0bcb75a1e8 0x9ae014c782edaab4d9f51b08de678107dcda6514 0xee606bdf08c64959f39c23a214485714ef94208d