ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2D0C95F3D79D
|
Infrastructure Scan
ADDRESS: 0x18d9ddd296b676d68e6658bcc6dcdb6c23c28457
DEPLOYED: 2026-04-29 10:16:59
LAST_TX: 2026-05-01 12:13:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 6.64 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.47ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-EB3B14B8.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x0dce23cfa940caa837475f9184a4a5fedb8fd1e6’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc16aafa7245b35c74d7c12670e4265d3809984c3 0x2bcbf52c7245a0adc50809e5d73a61b15684c150 0xe5cdc31d9dc5f9b5e73b3379784326e9a399218c 0xd3c62acb9f52a7b7b14e122bfa55fc38e018dae9 0x046070c2915cc9508968821ae6c7653de1927936 0x06554f2356f30209556820f01eaa0ad576333deb 0x4f1d0c5f9d3a43e1e72d068015ca918b8f117f78 0x41cc173fba304c33f2281e53b289f875f654537d 0xf84032fa0f0ca3a8e5d91b2bad61ee5d9da2ab36 0xecb0877ccd8d94aa1a1f5af884627a75aade5b4f 0x276b0bebd37facccb37d90bd67ad63eb897c624b 0xe7d30d3d7ecd9ddecf1f862ac1b66c928e85d395 0x5190242290f97c2ac6f44e863bffebfaaa0f48d0 0x45322b08891f3fbfdf3a9595babff06e63af7ac8 0x0e10840ee302c8f157b7d6ca783928cd873b0918 0x05419165d58badad7ac24ff13c0cb99ee4391a60 0xf045f2c0b9f49467422c979ab79c0840f2b8967e 0xa77a5851223ae40206575cf7ed2a3d07fd359815 0x715e11c33823a65a8d37b158e82dd33e356f377d 0xb4de7507433c8c9109426d7467ad320563ae4a71
