ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-341EACEC9E9C
|
Infrastructure Scan
ADDRESS: 0x9a7a5dccc7851c0f141d07c4d608a29b3830548b
DEPLOYED: 2026-05-06 22:16:11
LAST_TX: 2026-05-12 16:21:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 4 public, 9 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-6F993753.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 6225182E finished in 84s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc2260da61540d807557b2fd516d4172c4ec27b5 0x5f615046888933e41a05341079bf14d11091633b 0xc675de2849b954b05f4f1a6f9fd44f42336b1252 0x5e8240e5e32f6d08f69345df12e334a50a86849d 0x958b88b8ec8573abc7b06b3b144cf3ce19e0c057 0x37a0a16b027362087af97af87ebed36aad538cc7 0x740beac27698ffb3f3f8e43ace96b2bae3ea6784 0x8ba85cf6460f890b6c10374ea2fd774911973285 0xb231ab5ace5aa2ebf99bc8da56d21af1664acb90 0x41ecf227a4ce2564e8fd1a01082cb56bb8e1344f 0xd51c505ca87c154f7ed260580a0fcad95358b71f 0x698d9ae556dc0b8fd7e0d2968713a43e3d26909e 0x22d1884eda95c4ca750cc7e5332ccb379b5f2128 0xf37006187916764dcd979565ddbba3038f7f76fd 0xf4b7d88ba08fb86b77814395cd1b044187c04456 0xd3d25e7416449445ad577f64f8110fff880215e0 0xa9c0772c9ce5ba922888834ffab9886c0d5074b6 0x610b201cd63fdaa2358ac9c011fe6fe758308a2e 0xe8275e6c9ad3e1b9601f3d867ff9c7c7e0c0a250 0xd8551c90d1834849a3a0c94aafd2a03b05372eca