ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F4FB9A6C7900
|
Infrastructure Scan
ADDRESS: 0x0d90e44de8f6e004705a8b70340298187dcfa8d0
DEPLOYED: 2026-05-12 12:25:23
LAST_TX: 2026-05-12 15:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: ff5c9eb46cef944c. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6ff5237dc43af19dec03423e91ec3944067759f 0xb44de04aed4526ec9cfbb7e6aab7b9e947aed392 0xf04348050acdc8fb14f31cb0893437b8085a7c8e 0x7c53c79d504fe87880569747766054d92a3d0aa7 0xf79d7736db85356c1ce2d2390aacf446bd56c472 0x386fe407cc12d686684077dcf526f24456e105b4 0x5da9f662478d53256cf7961870202293def9d3bd 0x60048ee3d36649429bbbb2052cda34f85a37136b 0x3c3a19e7bef194913c7a522a7593780dee93b01e 0x99539755fb9602d1f9b27512303af8de10e11832 0x92195c14efbab72aff1259c194b8ff64a554a900 0xeaadb380eee124cbe4481abe76687878fa13dc1f 0x0764227c48e12cbbe469732a0d8c93f1f6a734a0 0xe774338daec01a03804b45fc177404f94cbd8c9d 0x479c6f58d4abe7b03fb50d68cff2919997e5dc5f 0xa2d44a4919823ffa1cd1a2485f11ec1188545fdd 0x39df6919c93f8d019f054b84233b0f56e9eff226 0xcd8527f167252d69fe2714751f0a21ca5fb74736 0x92f17b4cc75e103b3e7268e1ef3c1d954ed1b01c 0xc140f54f8e7129c928fe964b22eaeb5d3e1d93b5
