🛒DELIVERY GRATIS POR COMPRAS MAYORES A S/ 250 🚚
MAINNET RISK ALERT: 0x920abb09be0abeb9140fb0c69a7cd523b65d2aa0 :: Security Notice: Active Debugging In Mainnet
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A2BAAE51F4A7
|
Infrastructure Scan
ADDRESS: 0x920abb09be0abeb9140fb0c69a7cd523b65d2aa0
DEPLOYED: 2026-05-01 08:50:35
LAST_TX: 2026-05-02 21:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xc709. [SCAN] Identifying function signatures (0x57446c62). [MEM] Virtual memory mapped: 0x0000 -> 0x373e. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6324c5286aa60f81d2d59751ad1ed9b785efa929 0x4b7c9ba71bce97c80e0c8065edffc4266035d99c 0xca9120cbbf08cd3f4ba9bb16a433a78aab44f8ce 0x6f6208392bc229344f87b954e53463122ba20303 0xa739de9869c7b15bb8e283d50ac279a1071285bf 0x34d831eaf1ed5340817e2dcea9b609af4bfcf8e1 0x687f7b89b2657772806e65fd6c8b562301085318 0xf51b18d0e6249334ab21ae7ad46abf36a0617b25 0xb2b90085047ce6f9e2a4acfc244bb78ed3b99eb3 0xb78839f0184128b19477d3d24eada8af351a86f4 0x0dee8f13e29e775a54f843237ec170b359fc99f5 0x3dad954d173a9a5d4ae800952a6587976cf9af33 0x164bc486fb37a86b2854ff340bf67ea85afe7b44 0xa0ac4fc6ed42a5d1aba1a8fe1c5b66168a29b33e 0xedcd1cf62caa9bb55ea663805e3ffb63c59bb2ed 0xb6d575c22872621f8c99ad5384e818be22454af3 0x5667422ebf6f98ad631999d5e4d66dcb90bc32b5 0xa9deeac30b95a09d63eb7b09b468a85c74791c00 0xc4c26d9e1e5fa8df9b642c65215df3021498b324 0x060d11e3ef4659866b3e688511b5e1e8d338bd46