ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3530A904F655
|
Infrastructure Scan
ADDRESS: 0x148552e8fd50f4bf4436897b6f2eaffca3664646
DEPLOYED: 2026-05-13 05:43:35
LAST_TX: 2026-05-13 06:05:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.45ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d3f54fcded6347d633344967f4ec706f7198744 0xdd855c4d236275199df5011d529f59f09b86c4b3 0x86c245d4413b6dfb2dec6858588e9a26483196c0 0x16427ee62b78031c8fe41f2d6808eefcc99938db 0xf087aadfddf1ea4d5580d442bc86e132771e44e8 0x08fcb34ac623a0ebc072b636a2d7d12311f7ffba 0xa0cdb6ae7f6b0a2be345748b40b878fa3e27a52d 0xbc1a47e8116323584b460f57e215719a8bd6807f 0xcd0a24e13dfce2bfb4d34c3c0e866d5b2b12e0e7 0xaa5d403398426432dd48052facba518f41607695 0x4a2fb202d16b1bc247f758d519b0a29fdf055777 0xa588348b50d68512ae52d75e9da683c5b8aeac2f 0x865ffa79943e13b9687b63e6ea6cc8450d958db2 0xe8d07a3a3c9939b7b090c0bf606b1d8bd118f6a9 0xdc7d2f78a04d7738bfaad7960a5e8eebc73aabe6 0x8e82617012d208c75f2117689acdec0a0b688d48 0x2c6ae439dee7814ea7033797df845162a4f24ef8 0x9e4bd3a378c7888a872a10ea3c3319a3b4bd8829 0xaa48845ab85187bc8bd4b695357637cde28a8719 0x3df22aeb2e94a0f61d4b9e2417e97ac144278e34