ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-18C28740F234
|
Infrastructure Scan
ADDRESS: 0x4c8f3c90d5989f313037e0c628bd51e99495b76b
DEPLOYED: 2026-04-30 06:18:11
LAST_TX: 2026-05-04 23:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 41531C88. [NET] Connection established. Peer count: 41. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 81. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 81e5 -> 619d -> 3758. [VALID] No critical memory leaks during simulation. $line = str_replace(‘2df770da494c4d51b5aeed0b18d768876b4de7c1a04bb08e8c80026fe20f7a04’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3ac8d15d175eedc3d3e8779401b59c05bca8baeb 0x08f25af6e5e89bf3a4d80916775f38f9b82bf143 0x242a6b10255e942a2a4eea00497f88ca0749f6c5 0x74c5e399a6c36f3fff51acbb82ea93a8b93e80d7 0x0881bfff8a40cd3478645b79c20b7613664769ed 0x9b95a57302eb9e235eb4e4e767c6d2e1d82577f9 0xba42a5754de845445ab3621a4667c6e246d24ded 0xa3265833e89794c3ad2a06164b81de80570c30c6 0x4bd73dda917184ae6d98068ff42262e20e5dc14f 0x0140b11e500e0f555bcfa1ee5c55899ee90f88f4 0x063056dff9ce119d8548cde2166e90ada9a8fbbc 0x904825770cdff1623fc1eb58b3f59f93714ec22d 0x9d5be40d8f17556773454f5ea5e932816eb79528 0xf4842825db4ae6b5649a16730856389346ac2085 0x1adc15a8708172baf06a327c845b1eb691759a3e 0xfde404908e6d75fdbe1eba01e64e7e8c932b6d7b 0x1e884f83e0801ff559a7971d480b8069d570e68d 0xc91262c04e00dda3e8137008a38540b894e38a56 0x2136d9333af7e69db1a891c87fa4b35d68955751 0x497b58d1acef56a7f4128cbbaf298ecab2f315a9