ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-465050E4CCDF
Infrastructure Scan ADDRESS: 0xe1fcfbca7544c19e8252f74c357f951561988149 DEPLOYED: 2026-04-22 19:08:23 LAST_TX: 2026-04-23 02:32:11 |
Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 55ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): fa745de9…3975d63b… [SCAN] Detecting compiler version: v0.8.84. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 59 iterations. [TRACE] Bytecode segment 0xbb analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: fa745de9…3975d63b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6ad498c8b9bfbd2f26ecd9665ac71d9032245c1 0xcf826b0f582244456965bed89f7a7708f81633a4 0x328a840fd85df0caa448e75ddaf3d7cc8a1b6af2 0xe780aaf64b42bed85f761fd33eb2286f06f8f2c9 0x05adc983e771f0a535cb271e84049bba71e5c924 0x9b34bb564dd1d6b8895fe35797c7c4f64d2e6702 0x5464fbdac389c2294388cd5f96b94dafe8d179d2 0x2228a384037d99748b0e6c265afda8422744fa91 0x129a655ae9075657962a466ca9ba50f0305463b4 0x01dd32acb11a062658b5f2a68d24dae2ea33d3aa 0x31496c9d6c5ae0f0023bbab385aa319980880d9d 0xea0ea6f143ede9c6391bb7a775f435c9c04fa378 0x20beb823e8c2f44dffa4adfdf23e2efd82e4afad 0xccfc9a963a387b3ecd33868724749653d0119dc2 0xe006a4c9cb5b19cc2cb10e980e0ef7bfe6903481 0x35f0b3318317203a08d673acb9614ed43ec18070 0xf612e43bc17d1798ff861d9a0f9e75c29c401336 0x4aba328e5eee4959dbde82cf6547fb059e434cea 0x7a6a9e1ea1bdace862cdae1ab401b3f1d003be27 0x89d4e546d63ae114cb95947a033e5a51d247c729
796da11b4014dd2f9b49aac57e178322