ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6E38DADCEDD2
|
Infrastructure Scan
ADDRESS: 0x4f8b944f132d8740673b77a44fe61fa413a9b225
DEPLOYED: 2026-04-30 08:06:47
LAST_TX: 2026-04-30 08:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Synchronizing with block height 22259. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 137d -> e046 -> fc0a. [VALID] Finalizing audit report for 0x4f8b944f132d8740673b77a44fe61fa413a9b225. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xabdacf6b4f6e06953c13b3e2c3113f12770489a8 0x13e6f410f82dd9b793643341f72ff127a1544d75 0x842979fb52b0c19629ae3186838fccbd06484697 0x107f06c2ca737535f32dfe2ac2278a02b9a4f3e3 0x59e6e27a34b5282390d9d1ee293b3233f241ce39 0x36b9ad5a75d92be9fc0950b6e2cfbc5dbefe6977 0xdcb0f485762de761e29494a748ca705ff5c8fe99 0x728a7429b437599ccf87eaa8866263aacb009b03 0x1abd8bbf75bb70a736a331f9f9879ddb8fa98c6b 0xbd066b1498423a6b19f9099d0cdf051bd89cc1fb 0xa6d9054c10b79f56b2dc612c4ad577f292ca3c8d 0x89f8971eb3a1130e84b2b5bdaaa2b4865e9b226d 0x343e2c930761d0efdac97abb49f5f614c9df8d41 0x0783626d500c4c029f67d5be1a8cb850f831cc2a 0x19e7b2574c4ec1fd9a0a77888411fadfcfc118a5 0x8fc7c1a677209a9c80ec521e8e9abfc2656fdb36 0x7e012a6735e7fb337b06ee4cfd94a3e7b02cec91 0x334222fbf3a55eae09a081636f28c27dd5f069e6 0x201ddedba40f6893599517e81cc862352ef0e6d7 0x5ea32b4a6b8c1b80eae9525a71dec314cf8f40d2