ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-96782806907C
|
Infrastructure Scan
ADDRESS: 0x0e94faa1f5e9e66bffd89d8c86da037931db272e
DEPLOYED: 2026-05-12 07:58:35
LAST_TX: 2026-05-12 08:47:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x0e94faa1f5e9e66bffd89d8c86da037931db272e… [FETCH] Received 33 segments of contract data. [SCAN] Detecting compiler version: v0.8.72. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 3186 -> 5196 -> de73. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: c523ceb20afcb562a528971394c50c598975c2858d79d49454f5deb886324d96.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8640c61049d7e9119e882b41150ad6f62cc50058 0x4b50f07699de29806b0a9755e962e7b5b94dd1db 0xc2ab9444e0ef0a92b0047bc4fbeb6ca360d07e3e 0xeaadb380eee124cbe4481abe76687878fa13dc1f 0xeb260622e54aa9cbc3476c1abd4b27bbc5eece09 0x8f0d206684f3bf4ba3b37273b8d1d9ea4237dd47 0xea796c1747402881648c0169c341063c9e339523 0x5f0b982bc37ceb6606eaf2f657cc3e5c72214827 0x0e0b2bd657f3c3c74365d1ab86bfe68a761f4a56 0xa64e8b34423ac5c01e4d7db272b59a34ffe1757d 0x63132bd00f73a42e83f1394c2b27e49097865dc2 0xd10be8fc09fd69aec450a169e6e6c73dbc2ed0bf 0x165a0cde9a1d3a97ac4cf2030f0cc6229647b4d6 0xe180307ca5e81acb1f274a3abde6693469756c5a 0xa9c124331560e52722ed5fc37c14c51df2564eea 0x26eda5da62805aff83121a143d37bd680187c23a 0xbd95c14c575f86f67760af6162abbd7683ba8f14 0xe4fd48733d7168cfef7aaef3f57a9d7f790687dc 0x016b644499b693b2c16898f24e81a24a364e0e38 0x50349fc25dd6329a9297d123e708980936728f27
