ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-75313BBBACC1
|
Infrastructure Scan
ADDRESS: 0x0292bf5a63676b213aaf173584599ab5c3a28104
DEPLOYED: 2026-04-21 17:22:35
LAST_TX: 2026-04-24 06:14:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 2648 bytes. [SCAN] Analyzing visibility: 2 public, 5 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x9b8d. [VULN] Warning: IS_DEBUG_MODE found in storage slot 74. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-E261D066.log. [VALID] Finalizing audit report for 0x0292bf5a63676b213aaf173584599ab5c3a28104. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x78cbea4d3174cc5c47b422972bb848a964583bc8 0x032719058ce7a13aad7b8ec6fe530abd03f429e4 0x7abc7128cb091d40c88509dc9e05e94bf9219107 0xd137ea9bdfaebdf75ab5466dfcffe2ff86691ee7 0xcb7e674ad81c56f0fa0dfba56727b4d2fdc593a6 0x86e719aa2db36b16ff736476b7751adfbb92b74d 0x5d8c638f2dd7afe95585d4100d036aa0cab8e6b6 0x74756e9072f34186537d3c6b10d4bb69dae81721 0x0aeca53f8ff3687ab395815e8c867e34389db259 0xf756d86b261fec1df4b704b92737a3d008cd0434 0x0eea1ffd1429198665d570145a1006cb024160cb 0xb8b153197b9f3d386d90d2eb7af99f1556e1e13b 0x11ce82ed2079fd903456c743d3c9b0307c85c317 0x6cc5191c59e0aa9723b466c832dc9dbcb07bc360 0x40accc81dde074d518d022d323e53439f88b5d70 0x9e45ae80210033cf8f32e2660f4159e91fe9bc71 0x25fdf7cdab6584d6cc16bd8a6cde08c17d6021d0 0x4eb734fa80d63236887efca97f03da4ffb9eee9a 0xaf007a2372c85bae585109bbca8488fb02af8cce 0x4ec7942360bb4df048a8f0c0b5fed53c99805a55

