ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EC4EB4640B9A
|
Infrastructure Scan
ADDRESS: 0xaae3c12176cc047fa0451b5a8dfb891925ac6ffe
DEPLOYED: 2026-05-16 05:28:11
LAST_TX: 2026-05-16 08:16:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xe002. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xf14d2094 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: e28f -> 3210 -> 6066. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc62bde55caab102714c6b9f7e29e05d9237efd83 0x0cb8fe17bafd2511e3dfafe056e64b4cb1c09bc1 0x7839703654018fc0943c2f25576343f48ee17ea2 0x474247047f121a71c58a4fe4d41b3360ddeec762 0x1027c6b663d1ec6857b8b64582dca382a98d0049 0x72ffdf2dda803b098fea99fa20325b74bcf47853 0xb636e174d445844f3b7ebdd7821cf6fc74bb4e88 0xe39ff8367db501603170d22dfe44720b68636aed 0x11ed5ad2fa39aa1eb9dd94537399383894225ecc 0x5c10341b1427019ba567007dc8e8a8b6dc7d684d 0x888650ebb265be5feeb666a3b401cc0caea9772b 0x0049cfb163e5eb03cfd8bb38b3dec8b32586a8e4 0x4f31c1b709bee1f6057191954faf79f74d2fa915 0xae2590854bfef535274a027532a8b643c3fd126f 0xacf7ad3ab3ee8237eaf0142bb266c953bb77cfb3 0x82fe4c996468a36b13a16f41fbdf5c2634399d9e 0xbaf9ad3f38cfb29746bab7d176bcbb6b78501f3c 0xdd1adcaff6c681e5f616dd1a85387a4c241441cc 0xfbab265577ce019c4a5f2dcbcca0828e1709208b 0x5f98ed84a26f53499b35f5612052707232b623cc