ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C73624D9B64D
|
Infrastructure Scan
ADDRESS: 0xa90b082c66c4149df5f5d2fd1775e29fe4744f2c
DEPLOYED: 2026-05-09 06:22:47
LAST_TX: 2026-05-09 07:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 53ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x2e64. [SCAN] Identifying function signatures (0x2889276d). [MEM] Virtual memory mapped: 0x0000 -> 0x9a94. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x35cfb7a137f374b07aa12b8a7ab9a966b1e1276ba0784646fca4b3b403f88cc3. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x241f85fc2924f2695fe829803ab693ad899060be 0x34fe21deb407349cd29b4df7470452c94be4a8c7 0x367b3883ab5721b196bbf5c2127ab32fd8679fa0 0xc430b808ef2009def2fd008ee53f8a9b680e6e91 0x6181d703348dbd9d8ba27b1d4160ebca925da92d 0x10e97c3c44b6796bfcad345db5867c989c9665bc 0x21af51fa5cc63c0f1f007f35d991b93ed18485b2 0x850a84bd4d866b107aca019cf0ea12c7eb519e79 0xaf1b974399de6085575778175112360f257efcc8 0x62fe676dff1e7abbccbedc8babc993827b9fb189 0x717c88f0b04ac8c2fb4133056ea2c98af4d776ea 0x6fafd10a1f6f587f1f2d6108c32aec7860375e5f 0x0c3d078ab23b8a90fe9ec8cb6be1b7eda82203b0 0xb322dfdaa083625b8c4c1f9db2f7776a645b42de 0x13489078dbfbccd04ac29c18183b987685f2138a 0x3fcddf70ab877da243cb6b5d8b21fb8b12bc515d 0x45b9dbe3d64fccdb506aaa817fee5d48ad7f7b1a 0xcfe86186fd7a1d0bbd985947b25f9a3ed396d6f1 0x0da3fe3d06ebd69fcb02618d7fb36de34fedf2cc 0xf75a2f1fd557adae541b7d3ba4f1432fa3103365
