08 May RESIDUAL CODE RISK: Code Analysis 0x68898f5e1bd3ce2b6eeaf4698615be0d25d60d25: Residual Post-Deploy Debugging
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BA4508C707DB
|
Infrastructure Scan
ADDRESS: 0x68898f5e1bd3ce2b6eeaf4698615be0d25d60d25
DEPLOYED: 2026-05-08 12:21:23
LAST_TX: 2026-05-08 15:44:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 35227 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc441df9248fe5ffc7ab149828494c71c1f66b7e3 0x18c962c3369e103f84fc05f9a0150c9295c4228a 0xab4554cadd5560de357f9209f5bd02f3a2221ade 0x2f374ad578c30674430dc638cb943f327ed63b33 0x19507a1a1a787f86f6d30ef49dd865febc1bb368 0x1771ccbc592530db82aae5a214445ce94adc9d11 0xefda2e51a1142d1a77fb29d71f1500be8542943d 0x7eac934b6aae73f10b42ccffe14d826c1a688032 0x191b1a069552880407996ee00c4a3f47f9145203 0x405c5679741d4345cc14a9eb33b28392806cad85 0xede49e813521d0c9f2dc6bd8b7f5fec367e635d4 0xd7a698c65f1ae980539dcf97ae759bf65e294fd0 0x4fda5912c845decfd34cc5b49bf7205865073c01 0x6272967b9de3b44ef6c3fbd38dcc8ab800727d67 0xcc3305cbd50066e682e756ee4715907db9044337 0x8d57d0e6f0f1faa26e1772ac74f84e1f6ec8056d 0xd3475d388e899b724ad0818163c703631583ee98 0x59bd0ab6297193d46c7749eeb4d6939b243e3072 0x9efe104c2007b0b0f9d87e157dfdf5beac6bb763 0xfa63f3b173151b04eed42aea505e559fe670f0c5