ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5F309E4DE6E7
|
Infrastructure Scan
ADDRESS: 0xd6ea139e3b354bded42e9362bbd6e546073aa4e8
DEPLOYED: 2026-05-08 00:58:47
LAST_TX: 2026-05-10 15:10:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x4ec9. [SCAN] Identifying function signatures (0xcdcb1d15). [MEM] Virtual memory mapped: 0x0000 -> 0x7e4b. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 3650… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Gas optimization score: 10/100. [DONE] Report exported to IPFS: d8a4835a…d5e94801.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3f056289db1e17f1208f29840de1c57baa726f7f 0xabfe4e6dbcbf1468e6e50c2c2223a91eb8c43b18 0xe3e6d45a7edd0d06f7356314ddf1ac433d37589a 0x8da1e39ebea0c82696089ecba3944cfd746b450c 0x95358cfe43d5cb20348fc9f8441595fdea19a83f 0x6c8728679deb5cd628d6a89b3381e94ad0fcfe00 0xad7f53f2a91cf1dd55d53ac32199115751dfe808 0x6b197f2b01d560b74c8a4a9ba4958a3992e743e6 0x157f42a2ba3670914c28c908865b7c17761aae1c 0xd9fa88b572c70db76c6f7b3b8b7fcdd5a37cf9e2 0x700b687cf9fd94e7970a4c2e693c73cf35537c6a 0x73b44e3025c1b4a632e99c761056c382eb438f41 0xd57c1daf7f382560bed3c223c326dd57ace88ed9 0x3c3f773adf9b21dbecd54084c2d0fda44a888690 0x873ec52edb979c8488ccad47d334d39cc05ad0d8 0x78c2e77730116628c28873f1345ca8a32bbf3b78 0xa8f39d775397f635b4c7e869b3025ec41befe012 0xc17c95bb298bcbaf700c47905c3ae7029c20f0af 0xa37c24740d76d8edbfd6290bf20b6c98e23a9ebb 0x816071bf8c1a7cb92fa500031061a56565ac57a6
Post Views: 3
