ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E1D08783996E
|
Infrastructure Scan
ADDRESS: 0xe97f5cbe8bee6521d7f86f7ce4894bc5944c3e1d
DEPLOYED: 2026-05-06 07:11:11
LAST_TX: 2026-05-06 07:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xe97f5cbe8bee6521d7f86f7ce4894bc5944c3e1d… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 3 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 2c053742a87be994. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c8b29b6e59e1aaf21f265fc9e2d172ca812ae2d 0xacce4a7eb93e8f5decc4efeafaa056953c1e136a 0x87a40195437a8c32f3484b9d94bca37ad7e7f2b7 0x48236b86c42f80464776fd16e46befb8936d5f45 0xaeafe981107348a42bf2b3d2ab1316f518b36b91 0xb9783d9bd7022b1fca458518dc0e10646720acf0 0xa46ef12681bad78192e9bf1694ac45dd10ab2f00 0x61e184894d42a70a83adc262303c5ee8bc799b04 0x55aefa20905246402bbece98c36e496e73faa83a 0xa027e78a8d9f4db89c7243453cfc8fcdaff9600b 0xb11029706d15ff3986520cd3ea148428000945f4 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5 0x114daf56187c717e5787bc341e5eb94af1a49b3e 0x05b292cf0b7fe97dde85312ca093673b36e4da56 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0x715f0926469e46c431e64185e6e015b9233fae4c 0x7561488b775985abeb2181f83ffb89915df1b842 0x4362aeda70a1a9ec8d2f857c8e23cb5b5d102055 0x908263e4682c03c5d3104aff93dd6b2167bd97be 0xb3b405186ccf541ab209b3b503e679bb5ee4bf1a
