ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2CE39EDE28DD
|
Infrastructure Scan
ADDRESS: 0x87a64e6fb30b09978fbe2ae3c102a7520dde23c5
DEPLOYED: 2026-05-12 23:25:59
LAST_TX: 2026-05-13 08:51:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x328bc8bc successful. [FETCH] Bytecode size: 2151 bytes. [SCAN] Analyzing visibility: 3 public, 1 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: dc18 -> 84bf -> 0bf2. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘079d03075bb271b6eaf0013d841f82d86e0101aa583d6a65f6eab851cfc76ac3’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa5d1f11cd1d89e37edafa77875d4e7b8a97933d8 0x8d18950ea5d9c0d4d6e07c10af3d52e7b76b4da3 0x6e05d663141ae0e6fdf1c35ebac216d312f8bfca 0x732e90446649d5364740d7a9d0881ee4370ec8c4 0x66c66c7448e4f2668166c4322f6726fd17f11a12 0x71c029715369d20c407a3139e75531cd32a14828 0x7a3520065bde3e914b47fd6a79ab036e43653876 0x4ad6471954737072810cf68f04b39b7fac9d8c13 0x6128d25c1962281672ed9e1584282fa7178586a2 0x81bb05904e3102b4312f855ccee48904deaa0a7c 0xf0d5c8e61079e8342d742a6648ee5aa53ed11285 0xe32ed6087004caeb237919a6f6824e7cfedd81a5 0x8a3a6d56219a44b394e9830fc9f6fe2b49f8d1d7 0x1b3bde1f8aeb61b0ba0fb861d444744f4e0a7bfc 0xc100e1e213bf26ac829c8b48e48adef79211e20b 0x2ff7023890fc9100b2728358ec4d55a25aab16a7 0xcff02c13f01223144fe3bd83c87b0bcc7de0c5df 0x9fc13e34b23c233272928441199b0c252a6b5e95 0x8214d5523ccf26036e71e190e35a934a01658441 0xa2743cdc4d884f0c8a146e6dd1179b40b8192598