ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0FC47730BA6D
|
Infrastructure Scan
ADDRESS: 0x57d6e7369281946d7dc9811cedad297601085124
DEPLOYED: 2026-05-13 18:38:11
LAST_TX: 2026-05-13 20:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x57d6e7369281946d7dc9811cedad297601085124… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 2 public, 6 private methods. [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xfe analysed. [VALID] Gas optimization score: 21/100. $line = str_replace(’47F2347B’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaacc10e2fe417133d93bcb9bda18b42a54a583e0 0x9b0d2ebff4be574de22edcc52e23a926e1ffbd8e 0x7cfae186c759fbcf7d62af59ee446b8a9689ba1b 0xc826e343ff3767abd61615ac622471263526613e 0xc7997619475857a77026a75605555538d7856fc0 0xbdcc166f948d9d95b37ace4624441e6b9b1f7336 0x60d9962bc0a7a59741b543d880222883fe883f08 0x109db572e719fa363dc53fbaf3617422159060c9 0x74ccaea8b5489aa4a5ea164b5f4a02aa62f167ec 0x3b407b95bdf244837c6bf8c540f0fdf83580a84e 0x05da33719320990c1703f03af8b69c14a8be9ca9 0xecbd439617f21d3661dd8934ec34976e7be1617f 0x18e5be0381a1671eaecfdbcdb83856e7aaf544e0 0xab9e36712bd7fa3c183d5d909fa403d657dcdda1 0x2789ec8f6c98f32514eafd371db546045e8740ce 0xa9a9611b8133308f5e890334729523c442c719f3 0x0a2026b6ebbdee499a4ef0259f2d82819cca9ff5 0xc1f5d2f8c3f64e7d721bbded3931e3df598c167a 0x15752850f2d02557b07716b0c7ea047445d861cb 0x65830de52a38f8729ba7382f61407595a64515b5
