ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E9D71683457D
|
Infrastructure Scan
ADDRESS: 0x38ff778825702306076eab7cabe0efa58fca5e17
DEPLOYED: 2026-05-15 12:04:11
LAST_TX: 2026-05-15 13:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 8353 bytes. [SCAN] Detecting compiler version: v0.8.20. [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 47% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘a8c089e236f6f0767c2d7c5dbf593f4c470ea94387b506b8d0e34ac2ce79c306’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6d703cad18c74b7477ffd4e7d947862284e1e3d 0xbebf4facef8e82f5a516e35459c377b955feb250 0x2da18d903bd9ea3edf5e786dfe10454401e8d300 0x89859140d53583b639f2edb932b44e76bc591475 0xee76855bfb83ff504898ac3c00e6982b954b3405 0x97fcb7c2120ddaeb2af1d3845819616f915bf652 0x37ab3105f125d428f99b38c198a56307a321d9ba 0x3247b0ffc6f1cd8cc836fb74c853b839fa48297a 0x57ebf0f6cb54b80f8f1604d9739c9a326dcb03d7 0x08d9d3a15ce7fbd44b4a1006f48621d18c951c53 0x8752961af18d3340284e682cdd541edae030fb12 0x7f0e6ad67ca8dde32a1b4165731becf52b8af623 0xa29d4aa6aacce077a587c2823286ebee03d65af6 0xdb08763a85be540c2798778ca6797d13607e2f2e 0x7eeb0e4070c5167487cc127c8bc1e288fabd0d8a 0xc4ead8e908daab10b5b421c24dceda736962e021 0x68c1c8a076d4ff85dcfe436ff728f3c0b0feea62 0x9eaed4187711060e3ed5a41c430835754baf084e 0xe3fd3d8ad6aa9e1ebd65eabccfa73e86645ca1b0 0x82237f8de3ff2c1ccabadd6c9b240997b9f345fe
0 comentário