LOGIC DESTRUCTION DETECTED: 0xa7a2097ce4bebe471008adf0241b64f50f930405 :: Logic Analysis: Residual Debugging Functions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8E313EA1DA4D
|
Infrastructure Scan
ADDRESS: 0xa7a2097ce4bebe471008adf0241b64f50f930405
DEPLOYED: 2026-04-21 09:14:35
LAST_TX: 2026-04-26 07:35:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 2620 bytes. [SCAN] Detecting compiler version: v0.8.97. [MEM] Stack depth: 4 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x41 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x06de07b6639a4e26513bffa60ad6a0da3994f3a1 0x9204a356780fe4cc0239122ce7a3444500b4516e 0x4733c3307f65b75770fbd1b95a046584b935aa40 0xe57bdf0e8b577feb7c29a940e5c477de5884f8bd 0xc0b2fa699bddb7695038ba41b2093e9fa17ba147 0x663e77c8552d9cb1d11b76a18305c67b390a1a76 0x45d09eb50238aaa918d4df7eefae979b44d4aa8f 0xc67561626db9a92f2c580a9cefbf63bba1d603fa 0xa339e1a38e30140126223e616391ba343968ec0e 0x92f03a2ae8ce28db1fe6288e641baec6fac69e8c 0x6a2911f94da08da01158d645bf85152b338e015d 0x5c2e13c36027469e7d8da2b69118f698e5277716 0x6193327fd8ad88a662d52eda94ded1ab585ac9b5 0xa3acd64dfc5fa7e3eff39a60948ba3385f704be3 0x5306210a727c63f04b6c16fa7c266de7d4a3a7ef 0xfef0ad027db5531b01732bcd83a8902dbe3c9e90 0x1a5f147808eb3ebe41446384c6f5a329fd5b4f9b 0xc9abbad6fd946b88bb7d318e0fb3ce3ff6f6c752 0xb807647bd5840b2e15b3780e272e2875c36560b0 0x33cfe7a6f09baba164151ef5f88af37fc08d92ae

