ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CF3BD9137B4F
Infrastructure Scan ADDRESS: 0x8945706f9f07a436fb3fd212e168216c3d2909fb DEPLOYED: 2026-04-28 16:54:59 LAST_TX: 2026-04-28 17:19:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x4092. [SCAN] Detecting compiler version: v0.8.59. [MEM] Virtual memory mapped: 0x0000 -> 0x51c6. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Signature verification: 0x66ca9520b454daba956cd2864560369a7160b9be965a26541aaf4fe8267e69c5. [DONE] Exit code 0 (Success). |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7b57f8e368dbd1d552d2ba45fb33e3459bbaf8ee 0x26bc8288566f9358e65f1ca5065bb76ca993cf15 0x14fb63f7a5ceec9ef1bfd7f5841b08d729287ac7 0x9d091472798fff4135a8c1dcbc17db808b44328a 0x5643ad97de4022dc9325945018a4e9a89fe4d599 0x21732fda63218356bf5fd1f078fe8f5ec308f284 0x285bdbe3d32013535c904cbdcfe77b475b630170 0x558f3d36b1bdcfc7ff32297cd1fdabd144c12fe2 0x6c1535909aacc3a70744102ef0df86f792e3c972 0xed48613c2fd0dcb416780a06ceec322f0d6b2615 0x361b6e50a6830328c7233a6e654ce0fbfedf1066 0xccef6bdd7534f750eb1f494367493b5fd65c905d 0xf31c64cbc6aa66349ab430117fd3d5edc06b0a35 0xf2eefd83ebfb8436c4b20964b4bc1dddb428ff64 0xa4208d867da7e04089d01cd8aa6e804d57a2b16b 0xae3d14d7d3c5447707160a94794f1c1988ac8fda 0x7e5718a32185ac256ed5798e328d6c7b46ac688d 0xc8f2552687f5f329ee450885c2ec83165a48f01b 0x4b2c166ef372aa7f7cf8fc476de3d3e69926cf78 0x8ae13cf6011882277dabc4e70a8da551172b5d49