ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1874810B3BB1
|
Infrastructure Scan
ADDRESS: 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d
DEPLOYED: 2026-04-28 16:11:11
LAST_TX: 2026-05-03 05:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 6795 bytes. [SCAN] Detecting compiler version: v0.8.80. [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x0e5b75cb61dbdee72e1dcf48451d77e857a92281. [TRACE] Stack trace saved to /logs/TRD-96A3265A.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘c04191e66262916e962d5a0eed9a944883122ffff3621fb942110c9513712f5f’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdede89870d45bf04e947af1e6d2a424864cc372b 0x70b86a666e28891c8e3f91b2bc6991d816ebd154 0xc2c9350dfb84e4c56899b66524dca99ba61cf9b1 0x2ca0036b559c1e293eaac9dcd4674a0316d3100a 0x85bafc10dc9453098a5a38195924acc86673673b 0xc34c5174411c1f0ed6a689d1d14027d86e5e2594 0xf68940f5e9f71c94bc2dc668c588f68949b66344 0x0a1d80e4b87af50a92148411fd8b55de38f634ef 0x44f6df51b35b63a70497f2486d02c28d55c6e2cd 0xb6cf7a1650f144cb2a5c23110012f64784089cc4 0x59ad5af8ba07e5510560cd00df822228fbda4c44 0x2d3b4085dd0e43d04996dc0666e8d1c7cd053cb9 0xd7dfc63fdaa05c770d5710a4ac8f07783bf588c2 0x217651df4cd8a1253375beb6abe589f4323665b7 0x8c5b07a1e43b6e82f87e1fb6b7d70a039379d881 0x154fc5a0e02c407c527fe4708bafb8cde30949e9 0xfd22a9f379610800dc36c70f1d12cedc142acf8b 0x8f779037833a6a94b8c9256d4dde7fee5a34f459 0xf403a028be2dffbfd616ced00a0fe1d4021c0bae 0x1d1946e1cc50545c2a10ca7a668444beec83e5c3