ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E7CB9ADDB15F
|
Infrastructure Scan
ADDRESS: 0xfa3c75f3f849e9475bb026f70b51be27c90467e2
DEPLOYED: 2026-05-10 21:09:35
LAST_TX: 2026-05-10 21:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 62381. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: a325f2c95cfa2dfe. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8e2ca9f754d08256ef42d43a8e5b1d3d99d68de6 0xcd0a24e13dfce2bfb4d34c3c0e866d5b2b12e0e7 0x89037e83d73ffb68b41691064c8a07ec2edca402 0x6e485d4e7460c15a1b08f56409e6207c1e74a5c0 0xf133fa35202174e883abd9b9a97090af89fa5cf2 0x214c19fbcdfb683f2c726b4bbaf24ab483bfadf3 0xa4e9aeaf2a52199f39c0ea04ae7a37bc8f62e2d9 0xd42e46c773065c34599f29c233d784b669b1bc57 0x80dd4a7a3c0423f41c17cd264672fa46091e25fb 0x5736200527c8be2aca57a9eaa20d96acd7c7e4ce 0xac80d4ac62f355fc1094708071ecad1690e44a08 0x0171589388acfba22e616f53cfed2410bb5fd77c 0x14c56a6d616a60a11184e6acdd0142924e493885 0x3e06794027094fd17e569f7e693463c765bb9469 0xed52e7f63f8e0c112fb13a222d624770ae9af2b6 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622 0xb2eeaf0d1320ad424a73952a2bc9e0a7e12e2ff0 0x6ab2ed90ac902b9a1c1e122eead6a4fdcbc804b7 0x3a4e29e1da1e793f8a5ddc77f4510e95cacf4ad5 0x08edf02d6d25af57b5cfce545b7bdbd36d3d2ec3