ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1EB4229D4BF7
|
Infrastructure Scan
ADDRESS: 0x26ae75abbfa60a7447a0473bd80b669d61e91a01
DEPLOYED: 2026-04-29 23:38:23
LAST_TX: 2026-04-30 00:02:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xe4e8bbc3 in memory heap. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xd2bfce29… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0B4FC4B5’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb8a1f0a28ba859a26d0f36bd15fe9a6d2e1f0595 0x8195aa0ba0a09dd7e230a4daef1924fefd6d5457 0x5d65dfba5e3df4c50b31fb602b9fea35cd01314b 0xd4acb7f076257eccf0b784b32c0d9d201a4e5f34 0x00fd1b6f10f95c1b0011583a1f3c2f478e67997f 0x8df320c6a516938a582b5a0597435463b673e3eb 0x931d87b25f8aa5e451a59e14a56db10896908765 0x956f7e1ebc3a829269f8adcf760e1257a845c56f 0x1eefa923e36f05bcb6555df5a65894024f898ebc 0x2c059fa33d7d1b3dc83e539f5b1303538fb79d79 0xa5342507aabb7557610d4618a10f4dcd04bb59e1 0x5f0aef33a03bf0028fc46dddd4a86ee3d29e2972 0x6cb22a7900456684cd2f71ee0e74bd78490ce755 0x40712a04be0fa8ed362fa827abd4ac9a0a3a090f 0x1d5777aa051daf222a3afbe67cc3dd37ae784790 0xb2880b6ca941e5058f5eacdbf06b7036dcb30b66 0xdd3700324197b64d29fe3f39b53bc54237af9889 0x4a5c4e1bdbf9bfae37cc1464075b78a697495a30 0x0f37f8f39d0cb04a48679312eaf902159bdca9c5 0x92b869cab4d478da653f7f9278abdf0cbf19d1df
