ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DEA20B0ABA0E
|
Infrastructure Scan
ADDRESS: 0x7176e08596e9cea92d933424c3a8a93b5893885c
DEPLOYED: 2026-05-07 21:07:47
LAST_TX: 2026-05-08 02:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x7176e08596e9cea92d933424c3a8a93b5893885c… [FETCH] Hex dump completed. Entropy: 5.38 bit/byte. [SCAN] Identifying function signatures (0x0633effb). [MEM] Tracking pointer 0x1801d20c in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 9468. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb0fb618ee504895392c09cba0150e32964018256 0xfc7f7b4ca0c7219507cfaa230fdd4f82679bbd15 0x0e48d70756a4feb4492a176100a66bcd31dbb842 0x52193bfc6823e36bb5077759656f6f269bccf125 0x1ea7c0949229890d0dcfb298a49d5306f7e6632d 0xd2d16d92f88c049cc9dd1c1534fe2319bf75c151 0x383ed75b52278269953f292a535bd6d59abc9677 0xc435f4825e9d0475219ebe70b1037e3dcda361b7 0x3dec6c528cb2003c7b8c6d086b0c40aaba6c03dd 0x6e485d4e7460c15a1b08f56409e6207c1e74a5c0 0x9a4944a7001fecde1303c88e36ae787a090fcdf1 0x68d7b3f5008f77c1097420a0a27e749b59cc7b21 0xa3916655f95c7a8589bbd0363c7e669a238b0ef1 0xe914aa4bf0b3bc347b69c4ad3ff710097993aa8e 0x2094ce4f820fbfbef1ecfff2293279687dc30118 0xf2d266e4bf3f95160144d9fbb015fed8ae2d5ab4 0x28798f858021ace12b37d42f38f3becb5d1d04a6 0x5408ebfe1eb1b43308a96aedbdfd0f38062a8957 0xf8fc1b627cb35e305a9d7cb69cd26631642157bd 0x0ef4dbeab28159887f0c2eb87b509722a7b11917



Comments are closed.