ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C756390E5AB1
|
Infrastructure Scan
ADDRESS: 0x8536281d3372525a9d8e073faee882ede6553b16
DEPLOYED: 2026-05-10 23:48:35
LAST_TX: 2026-05-11 00:35:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 8201EF7B. [NET] Connection established. Peer count: 21. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-7F5EE023.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: f06aed878225c5cf071afb5c91aad728b17e3ebdf7ca001520d9bfd674f7f591.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4b2c01a529b87dc54a46eea3316965c4eea7638d 0x97f02f1a251935f39246909256a127fb12952aeb 0xd9e8d69ef89d2c89d6d2d0a74ddb86ed250b5a1a 0x2c6ae439dee7814ea7033797df845162a4f24ef8 0x160d5d07cbbed5f0cea2ee434c1d11e6cd4d4c43 0x52931ac44ef91d79b62d655ce0a6d54681c3d4a4 0x3d64c2fd6f77f951cabe38c5390ebe0c914e6cdb 0xa9a9611b8133308f5e890334729523c442c719f3 0xed03b32f506edce7cd961ee22fab91fd015fe2a9 0xc63d2f8597e726de589717683009a46c4c28b43e 0x93275f4e81a77cb828634d67ba0897eba6a3b09a 0xc3058baea61f266a27dc81f82bffc12932b14cb9 0x593b2e05c4e81926f29a468b1db4621d6df017f9 0x54f5bf8dff1d0197fbeb6398afec759433bbeaef 0x4271057772d61b9abaef106132d5b007c1d473f0 0x7ae5b63c064f63a3e82979f626d675d19b116e7f 0xc43778bb3c8a2733d298cedc19c81ed7e9821c8e 0x2c20c7ae7c6c6b92557e9b8c7d37befd037f2cf8 0x50a049750246717a5a63ba776aefb087c76b70c7 0x422fba4903fba54b15afccf3a7c3cd3509eca71f
Comentarios recientes