ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-99635C48CE36
|
Infrastructure Scan
ADDRESS: 0x819c4cf44c163722137cdd784a4f7930784b275a
DEPLOYED: 2026-04-29 20:08:23
LAST_TX: 2026-04-29 21:01:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 22 segments of contract data. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Tracking pointer 0x5c18aefa in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4216d80ed371bf06ff0ffe3f12eba41328c539f8 0xec7219eb20dc2d6ac7782ee3220fed535dee15b5 0x7a30cfcf269940169028c65d3c9e198abd7ba8a6 0x6d63c94e038667e0cf5cad969336d7f9c588578d 0x3848a840da61c8beccb86a58e2e59f4574801f39 0x7f3fc69e5b63d20c27b51372a6579d48cf309736 0xca8345749fc685d897548b3339deb5e2c5b25adc 0x147c2b68f43eff391d8008edc450e290d731b5e4 0x81ef7cf5b64c4ed03b7c2d4df8e4576782b40900 0x3b69e08c4c373aa2eedfd687cd67f2a0948a0eca 0x01294b0f8f4d1625dfe9eec5466515db83c6c9dd 0x367f1e7399b27b3acdc38d9ba3390b5a401ba3e0 0xe9b993f03a99e50b082ab0a57b26a52c0f1cb6db 0x976eced8388793d9170310ee19f4fa175f45cb0d 0xea30f8e4899f1fe9cd4d8d25bb6750cc45b1205f 0x652dfa6df4ebb549ddc5b830c8ae08d8e76352e5 0x01686e660e3e225b9b384bb32e67cd17c90aa99a 0x2ffc51cd50ec4bbd432542a18d2b5f41723c84fd 0xf1698a4ba536f2f685a99a6aeb591f1024d077b3 0xce85f3f0032ffd037dd63bf11f9137cf36cb6df2
