ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-91D51A55BFEF
|
Infrastructure Scan
ADDRESS: 0x7682a066bcfa1c8aaac82e651122ee38fc846471
DEPLOYED: 2026-04-23 18:22:47
LAST_TX: 2026-04-24 06:11:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x7904fc3f in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 38 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7014d051e7b6c333599440a8463a0d7c2ab89cee 0x4152026f4ad1b3ea713cd927314608e1bb823a55 0x8615379c82f2ee30920b643001a98a3f3581de3f 0xa91230fd8e927b7c055eacb3ce036ee625ed4d3f 0x21359f2e107d2cd1d0a1c4be2cc07bb532e13b16 0x8053421c183177d48c9bcf555bab5a974bbb2807 0x2eeec88bac1aba4e9f9686518eeaa4103e1f19af 0x2dfaeedab02a31c3f273c3e4f2d8794ec683d469 0x70675d9cae0560b65cf58e2148a00de2547175a1 0x4df5331676488bc9d461b02852ab412398037e08 0x1ce956ca177121bb1a741191ec2041bf236ef8e2 0xda6842619f48929cca1b1462fd8d330c93504ebe 0xdab93e727b2382972c0863a7ac22e8b80bfbbc88 0x64ecb16e0de01dea5b73b9453a5892176f79b889 0x70378fd6a8da041fdda38460394d53178cfc175b 0x6d5836d3a533991c29305d889067f2602ed39d61 0xcc0e7d8cc5e7dce074d7f219d2e6125839b13808 0xf7cf310a7d016332ce8776c4da8633eb8e04d482 0xe20984d7a3a1b148d2f2806b7234a60b1e7c9c2a 0xbf553d8e8803e3756224641143a932d20139fee9
