ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2101EC031A7F
|
Infrastructure Scan
ADDRESS: 0x4c8911e473106d22287029b295f721581b160bbd
DEPLOYED: 2026-04-26 09:41:35
LAST_TX: 2026-04-26 10:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x4c8911e473106d22287029b295f721581b160bbd… [FETCH] Bytecode size: 5727 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.95ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 90. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-78F33ED1.log. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x6a92bd13221a8e569a3dc863b94d1eef632bb1a0’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7623ee55f82ba257de96ae828363b548e808b045 0x25138d10837ab0278eb860454e1045f2b92929ab 0xd523fc649b214402c1ae4aecc090434431d6ce63 0x57282f1e5d717ab9b7d31c301c0db5447596f58e 0x400c12d9700be5d686ad32f8d6206c97de1e967c 0x615396a784626b6a7d094ba2131ff8d6738df176 0x2b0a2ee41b17210042f4cf4ecd8d45e7c148cf05 0xaffd717d4ade9a49bb676a638f1c110bea51759c 0x58f1568cfef79efa29f193efc1d0b3523fbef584 0x28e717ff6c5bc06623184c0dc9f064841a8d5a18 0x2d65358c3c1ee633388779245bd5fcd229915bf3 0x1a26b67c5d3e3e8b8c7f2f61a1f002bcb7a64b89 0x1d58adc0a3bed121f42c11d019af18e6fc99e947 0x5efdf0a3b5790d7a12fbb677fb99f5dae9c2df68 0xef0ef801a52cc920bbfa4630d268a24031ee37f5 0xab29bf0d54650dd1977f389633214fe2ecca9102 0x6ec9651b9db43ad0c0550f3cf5f20a4353f0313b 0x677a02fbc6e2712ee2c410abc4f5d2823a3c7fd1 0x23b61990b71c4b4d1e0be1dbccdb1f0051475f7b 0x03e48c757a881f5b85557d3b3683b8222793ace8