ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9BAD361F5D73
|
Infrastructure Scan
ADDRESS: 0x7737a71cfc1e6c7ea85bbb11defea72780ad2a7d
DEPLOYED: 2026-05-14 17:52:35
LAST_TX: 2026-05-14 18:23:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0xbe73. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 913CF6AE finished in 18s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x633b3f26d3a8d6d12917111f701801fc8892a909 0xa39c41e9ed837942d693d38c4d9b4f1ee80369aa 0xdff834d42d5dc151926ad7403771e4a3c762e9af 0x9b9031d138c5f3dcca57b0eaba9a7bdf20a99ea0 0xd7319a25a5f01485bb89e49d29bc4074c26d9bd4 0x514e22d387a9ea6940f36e35cc56efa6b7246777 0x86accace3c213e173e85aff242eb972485a4081b 0x5e8081ad9f2e34b58480e6df7736f8f136ebfa13 0x70c1432c6d62aa5d80728f0744db4e1e0cf03eaf 0xd0300956ebfda7511852ab178605f774d91e0a73 0x762eab0f446141229110ccae155d5549ffcead96 0x798ceb003ca334ae8b2bfb6ea7232b066d928d87 0x145102c6be5e5f3de55c73ddb01e04e8cd22b613 0x5cfa92f8bd9d040d28d3018379a264b82327c610 0x016f4c16c255278f92e96e34d9c5671f68d0991f 0x81f557bd8ef6f4d4ea4fb55e303048c28b71527d 0xabfb0875fb64feefe9adea599d861010dce9204c 0xe8f9924bd0ce5c519cf9be24f5b81962eef9eca5 0xc670e9d23f52e7e1cb0ce8b77ea358f994d1860f 0x684b003bb7cc96197666936bdaee6de73486ba5b