ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F9AE0C924B92
|
Infrastructure Scan
ADDRESS: 0x4b8cc11c635bb870a8efd63bf51a23207ade21b8
DEPLOYED: 2026-05-10 20:55:59
LAST_TX: 2026-05-10 22:37:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x409b91cf successful. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x99193d47). [MEM] Tracking pointer 0x880bed5e in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: a49fb114e605c3bc. [VALID] No critical memory leaks during simulation. $line = str_replace(‘d1a5cefdc434746aa690d055c2fbb1306eb4c211c50714da58e6ea061bfbb4df’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xddaa00f9fe3b3b8d8c3608a37437dcf43d428a98 0x7d3c026c18e1fe71e14a8419da56d5d9f9da1c7b 0xe44da18cae5138cb0e56f517b950b1d214d5ee4a 0x3e21758691e12a713be542275ee69016c5b11660 0x699c35637cfb2bee805f192d93616cc4f3ada471 0x484669f9709517a99423d186658696e956219e98 0x231f3bc8f608153a740954cedb93ac900e2fc18d 0xa8e8c3ad12ee6ef08b2c6896e19bf7ca9bfaa146 0xfe75f96cf0b01524ff9609066d52f9703eada81a 0x6f86ed4d2343930d6cd598dc91a7a20520bc991b 0xee2e2c9b1951ad20e1a0fd638a5f0f5a773cfd6f 0xb79cc5645056762890f47b477f34690b93d57416 0xbc64e84f47bc96267c3f76f387316a55dbe33747 0x00174d0e5d4d8949471cd9075d8ff969ea64398d 0xee799261a342599c8584791ab16cf703de9a864a 0xac32af81058fe708697dc4ce714b3921413ac8b0 0xcf970c4ad611167a869df9a7288286d5eab67853 0x6c6e389adae1dae423572f03ffc7626aafa03d4d 0x7268fe665aaa9e3d0601d57064f09df1f6c0779e 0xad0fabb9882943b798fc60bc38b20fc4552378b6
Post Views: 4

