ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A4D0EB35C5C3
|
Infrastructure Scan
ADDRESS: 0xf817fb032c1b4a15f8e8d08b516911747f032099
DEPLOYED: 2026-05-12 07:40:23
LAST_TX: 2026-05-12 08:13:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x10400e8a successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x8d16f300 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x94. [TRACE] Call sequence: 701a -> d23d -> 38b9. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x62b5c17c114a154278fa288257bf8e7a993e3b56 0xa92e41fca4f4a835f3fc9b884d8931abacf2a520 0x4c8d0538dd418a1acabe10e76d67fab96eb4f6b5 0x903085fc470ff018720f11162ee86d1f3e637bef 0x1c38c966e406788475edad21dfe0473f40fb9bfa 0xbf2ef803bb47f08216115738a16e77021c70cc22 0xb8e6bd0b9fea4d0134f5994630a09259c3cc2b58 0x4f6e838badafd4b6ee929051b7423802006979bd 0xf2f4484d6abb3b80bff15f20102396bfc3169330 0x1b43cd6fc43ff94b93f0a284296b8b46fb171417 0x7f27bd12e262fa08aae74f3d3985525b3ba5d0a6 0xe4fd20d346e61f17b552dadb41dfe90327584eed 0x4c54ede87b3082acbbef684793528ea84e36f311 0x5594f8ed026a3c668d7e41bea3dc6979019b7743 0xa7e62acdd5122e8fcfbc4e03a8f41b24c4028d80 0x0b80b54d7df64f6f8a82f84ad4d96a455fefc9d4 0xdc001d8fbc480794c8d0e1ea3542c2b200a575b1 0x783bf15b171934ffb9993b03100b7ebbaf362f85 0xcc2285312a371e6d49a7121acd1378c57fa99b75 0x8e51cecc0d22b973b15c521d93667aafee720322