ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-408B70AE2FDA
|
Infrastructure Scan
ADDRESS: 0x000006000c41e48317f2c2ff7f479d631ba8ed7f
DEPLOYED: 2026-04-26 23:02:47
LAST_TX: 2026-04-27 00:51:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x7586cdecf583e773572fcf83e91d0bf4904d08fd. [TRACE] Debug: 72b1c10a7c4a88ee. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x816e79a1ad73b9dc7dd4f08ad7b606b08ef553ba 0x26ca842c5490b93b88e4e5c7a1617e4299063a5b 0x5b0c23ea326757be75ccf9a6c8fb0b20c67250c4 0xfc8080867e3f91d616d800bb63acc5a5cb32290e 0x7a0685f7cb9899b7b3eb2d8326a669db0bff62a1 0xb9798d71096d67d6ab662257be463de4166fcd16 0x364d923eedb845946a89b08773d9d767a6ebfdb4 0xc122ee72c808ffd530fb37b1cfb1ae819196ef32 0x0fef7f7a2b77484089f38762c984b4c1d8bc11cd 0x1f873db6f1823ea399ebbd4d4531b1b0b3a2ee90 0x21928cc0391ecee6851375e4f5ee0c3acaa6fb0b 0x46e65ae8f0954e7d2e127ff1d15be3242a7325d1 0xdb03ab96c8bc348721a342f613716a543407f893 0x3c5f3a8297a068d12f07269963a9073048dfff25 0x8c7e3697c2ecee40fa747a1bc1dfad3d28395ea4 0xe07f043953174b8baa0eb3608cb384465af067c9 0xa8f8cc0a2004570c4689d27e620ceb60b3a68bce 0xc03799b635c9328b8a2d596b1441e6a61fea3667 0x5efdf0a3b5790d7a12fbb677fb99f5dae9c2df68 0xc28ed0481d152beb49df5939f2d55514cdeedb60