ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37E6EDFE6F3C
Infrastructure Scan ADDRESS: 0xa9c646e48be74a15c98646cf197450df3aab5dd5 DEPLOYED: 2026-04-21 15:31:11 LAST_TX: 2026-04-22 22:32:23 |
Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 55ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 1639e274…86da11fd… [SCAN] Detecting compiler version: v0.8.84. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 59 iterations. [TRACE] Bytecode segment 0x03 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 1639e274…86da11fd.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9f41b30ac128acd07901f14366e2c04e747041f6 0x4638dd2f43d50aa015ee278384dfebc498d0b6b6 0x5d615dd9944cb35bcf07fd05e4fd3173e29701a1 0xbc256368b4b299a031763a452484f7ae55cee9c8 0x84f7ae8c8a700b70bee683d441c5884a5c291c19 0xa3dd5f1b36795fc13f8955bdcd74b360c7f1de13 0x975b9f8053ce236253b8bd274ae9ab69ddc27227 0xa32faaa758b51950c57b107af5fdd58d80c2e811 0xf17c0edcaa28371e9c8012d7699bf40ecf0f58d1 0xecf6e854b7fa52fe1366c9c5bac220a69c2d3b36 0x5682cacbcc49ffe57c55d8173f3a0413b1d6e7bf 0xdf06052f307c8e0ec3bd8cba8e448918905721ec 0x51b5a0fb4d75a775b974c7edc0f897c501a5bee4 0x10e2c49e44b7456fa88b48098ae4dd3650e0199b 0x05feba1e86be720d4de3c2206b6aad667a4a45b3 0x129a655ae9075657962a466ca9ba50f0305463b4 0xb8baffa50dc721a69cd4c14dcdb40d46f37abcca 0xb7d62d725aa1d4b291aa350dc4c852f0ffdc127e 0x288bb81e4c485f59b45f294d2da6c202c215b5ee 0x4b42c9a34a2894c90f692dd9228a58b2555b4683
796da11b4014dd2f9b49aac57e178322