ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37DE6F54E9B7
|
Infrastructure Scan
ADDRESS: 0xc1690e3ea2af3facaa0b02f525a9353fbfe25726
DEPLOYED: 2026-05-09 04:22:23
LAST_TX: 2026-05-09 05:01:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 7179 bytes. [SCAN] Identifying function signatures (0x56bd14eb). [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 50. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0xc1690e3ea2af3facaa0b02f525a9353fbfe25726. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9c3ff21e253b230b94bca4a9c1583eecdef520c5 0xd1947d5e0643c399dc19c889fe81a510f992dfc0 0x798ceb003ca334ae8b2bfb6ea7232b066d928d87 0x6181d703348dbd9d8ba27b1d4160ebca925da92d 0x13d3b27c7c100621cb3b714deab858ee06d41db1 0x87014ef7d85cc900a0a354dbe478ae260e212e96 0x71c2d5da8d55f54889b544775b735d3331b841e1 0x8816994a935e733e9c9b46759571f489fbc3b6c6 0x4f481b2998d58ae77b6e87a7178d9abbce0f351b 0x15d30c9470ed93ee2244694e40739468af5fefd0 0x53a840e5c399050971428e938de4bae5a7c5dd17 0x668c659b9b124c406c2ad5d216ab62f3bc1fb6b1 0xeaefd3798ba3bf24402b6df8b60d5bb8aae5e0fa 0x746305b3abb2ad4a3f759be20407205a9b3e7b6b 0x627350eeb3d33ad48cd6f5f0a0e0001d9359652b 0x317bf9b389d4d1ed4830453afee51c28d0521201 0xb6c7fde783c5e779c184dc485a489206c2324bc6 0xe6dce6f4960b73e7e4c39d5f42586e1ad04e2f0d 0x22c1f63a173e0bb3ed0daa31012cb07f8acc7994 0x4b258ca4a30822a23e2b1bf8835c21f6f0b127f0
