ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A5064452BE91
|
Infrastructure Scan
ADDRESS: 0x29e2d3d3f89734c19de071e31e70d9e426cf1841
DEPLOYED: 2026-05-11 01:16:59
LAST_TX: 2026-05-11 02:08:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x8da2. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 47% coverage. [VALID] Gas optimization score: 88/100. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9e2af36fdc8dfb1aeb51f4a7dea53cd03d6d31d 0x17a3bea0673d5d1f42f157aae847318aee1b2c2d 0xedc4a2af154677abc794a9913fd9f1fa3ba76e37 0x1ad2dcd03e949ba8f671f88457fd7426524bae66 0xd83858aaca78a875b4e9c55fa99c0f07a1e38e64 0x4032094bb41314da445e5e3b10fc819ead6e2634 0x35043ce9b4922473e883279eb632a209a8d77dc4 0x22c1f63a173e0bb3ed0daa31012cb07f8acc7994 0x37e2a0887fd39b439af67b468758ef5e8872e026 0x3f0df8502fc14b857bf0ed44d82db3385327086a 0x51fa73c1ff39c8d9d5bf65f2d57858bb12c228e8 0x114dda6b95548fc6dae450dd1c12beeff8c07d3f 0x7cefe31e43c59101a230c05fa6818597ca88ce49 0x59da498837516d59658bc863d74b3f241e1b1833 0x5ccab88c2a098b98a6ac4bf60422d90f45c34c3e 0x93975b11bf92097ba2d43f03118c4cdf8ec60b31 0x36365a37f733ae63c9b8f954e2e658b3d4a5abe9 0xbb49691e82f09268f1b257df767f24a1226e35b6 0xded7941041e6adc44c86cf3331eb2bf867084096 0x84ba46489f45f49fe7691902affe4d7d9fa0df6f








