URGENT SECURITY STATUS: 0x18d9ddd296b676d68e6658bcc6dcdb6c23c28457 :: Security Status: Debugging Interface Alert
0:00
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FAB07DCA16DF
|
Infrastructure Scan
ADDRESS: 0x18d9ddd296b676d68e6658bcc6dcdb6c23c28457
DEPLOYED: 2026-04-29 10:16:59
LAST_TX: 2026-05-05 02:47:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 54 segments of contract data. [SCAN] Detecting compiler version: v0.8.21. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x3b analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x442d74fadc234265d05ae93e719e78f3546bc584 0xed11ef1ca37f12635fff6ad6163486f884a521ca 0x51f580e67401f0ea6f4ef545dcbfa16bb6288db5 0xc9514d4094370f27b6a73dfa1c6eb4b547c4323e 0xf35f8859927a95946b2609b40f61300d61c25f47 0x59ea52d2aa8195257a02ff728ec55dea0d88a8d8 0x2a39dc549d9a7e01c97c66a2283baf030e3c9398 0xda06157c68c6dd6cbd2a744f5ad3dc1ac4d594a1 0x41575be27bf6b58dd7dedaf717b70edff0dbf338 0x9510b6633ad9e294ef19197a6b074cbd9b4945cc 0x07d60918af301440aa5ea22f9edf474897cb6a19 0xb7d474b5fbb419b7df99eed8619dffbb0a5da2bd 0x0e54cef6574b0e224220b2c4d8ba399b2b1b04da 0x210bfac2ce2da94b603f927c6ddefb9de6954f43 0x28c786b863ff231ad28e3aabbc5e2a878c7ed0c6 0xb0fb618ee504895392c09cba0150e32964018256 0xf6e9817663e94170b3a013cecb96600d0edee02e 0x5f5b7284e66c011b4012945a360bfe1d019802c9 0xa335d02bc8ca648270a1c0a9676103976ff82562 0xb522aa785bfe6c5fb012a8e2a1d1772d009901c5
Post Views: 4