Uncategorized
by Elegance Eventlocation
ASSET SEIZURE RISK: 0x220d3ff8fcacf72f2c236dd109995e1aaee36e59 :: Administrative Risk Due to Open Debug Infrastructure
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-88A82FD3C67A
|
Infrastructure Scan
ADDRESS: 0x220d3ff8fcacf72f2c236dd109995e1aaee36e59
DEPLOYED: 2026-04-23 18:34:23
LAST_TX: 2026-04-28 19:00:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Requesting storage slots for offset 0x00… [FETCH] Bytecode size: 5085 bytes. [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Execution path: 57% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3a5d9fc6aa764bd142e8678aabf84b11b8e2ef2e 0x1dfe17f7dc036ceda5bc9ae2aa9c8a2ae7094458 0x3c092b08d79b2692bdba7e8c13a4f46feff44cfc 0xd358237069e665a625828862a8c5bd06e6b397a8 0xc8420900a00f08fdfbc799afe7c9848825ae951d 0x0af0f58d7668ad710c0ce3aa63fc91eb51e2a2eb 0x2420aedf30b70fc4112fb6bd4f3aa228567e984f 0x84ecd8c4b989c3609a3be53fbefe752900edd2c7 0x856cdaebab1b2a25ec27cf26311cd86d6e32ce81 0xd8dbdb0c13ec2dc3cc46e07ae41cb7f4a2fd8a56 0x24aa28b2cb88cae39a95f84d7b67e9f290712bc6 0x4a4d772b74c97482cc8b9af46f1f86098aa9a500 0x9669ab02b582b4da431c37d2e58e85a2bae9d3fe 0xc9d0fcf3ff5d595980001863c990de7cf5a43dfd 0x1d345122a5fbd83a1d4910050c945eabe29bf2a8 0xb78da4616cfd46ea496ba672f8be7d2b4588e345 0xe841d44c957f14384239b00bcbcdc391e6d46067 0x288eeee963ee934ffc10cb111bc492bc2c49c3e3 0x4f5deb376800060d51f4931e967ea353b4667e8f 0xd7b073810fbfe57e6c50a1ab08db4be899aa678b