ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-23247215566A
|
Infrastructure Scan
ADDRESS: 0x12a77658112cf42914cb614d13653ed5852da1e5
DEPLOYED: 2026-05-12 07:57:35
LAST_TX: 2026-05-12 22:38:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 75% coverage. [VALID] Finalizing audit report for 0x12a77658112cf42914cb614d13653ed5852da1e5. $line = str_replace(‘B6C3F348’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6ce09eca8a28f15a6e1e9f59ca89e2c662179788 0x7d69f9de3123060c0a3c71eee69253a0c45c703c 0x2d2dec14bba861ca51a6f3321e839f4da0d34c1f 0x00129068e10f0ca232cb77eb579744aeac2c0166 0x677e2948941b5adf19a17328143ca7579137de08 0xea93b4149abd65ea35ba4da9c5e1ab0e2f18dcf0 0xc895272de08d17c0dac2792c0faea3b142305d0d 0xfec1d37d0b44ef439b1e67631f852e2b4eaca1a9 0x47314bd9697dd8a15d5b64534415635c9eed1159 0xe054aeee167dc213886f343647f451bfea6bdfa1 0xa983d32fffa37d4bde3cdccee31f36e5e930f616 0x9033d73e2def13a608375d24136670f51f25af6e 0x4fe57110016ea4f4010d6e9f3d15870f9f90ac53 0x339eee54b9d438d07d4d6d8898a9c20f3b2286e0 0x4c8b656b694517df4d0695f7363f98e3294d9842 0x8762eaa08cb5df62af0e74f154bd0e1540504b8b 0x9edb7b7b005c1b0cd9e1013c5c60e385b1a1b31b 0xadfb8a6272f28258fd75d973be3967ed06e38457 0x39181749ce71f8f7268444a6ca8b455256d20de2 0x0fc482136c7d3b43963ae649dda11836bff6d976
