ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C947FEC055A1
|
Infrastructure Scan
ADDRESS: 0x949623419f251c7b81ed6df485e762f620bc9a1a
DEPLOYED: 2026-05-06 19:21:35
LAST_TX: 2026-05-07 05:38:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 32ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x346eb03ee6d19e7766809e6854eaf92b8cd102cc. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 33ee5546…78493d6b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa6ab243a71bc7f4cc9ce19cc9655d52ce0a04254 0x8594324438fc72b7421e624564e2b715064d2dd5 0x0c03fd3a4ae91da149112bafd7078a3c36c301f1 0x4050a3222f8bd0ea5ab2718cfba5f3e7afe4c3f9 0x151f57b06f7bcb24631950369883af98664d79f6 0x41477100dc76c2bf48ac359140acc2fb984dda85 0x550ed9d401301dbe73e49385cf812f4e91c565c7 0x67950e8ce338a9dadfdac18a2f62a3cf2930f497 0xdf6410d3d3b74b3170e0f2e39bc28f6662477d93 0xcf6b8d3d7d8ae67e7c94eddd5d7386a8445aa803 0xc8cd685a68820d0080f1a1ad6f7a25ab5b6578b3 0xa68b676734c23a8533e6dc3ca7857861d942e967 0x085558bd42ff2c8e2084c29f68801124a665388b 0x84c6e93606cd606125882cae0020a31480fdc828 0x8d5637999d02ab6a2e28d679546e42d7e00cc80c 0x62b4aa4cf726a466853fa550b067c4019790ba37 0xb4bccd83209056e933c4690f4d9c7810a2294a52 0x3ec2a7f53f6daa511097e1a579af6da34444967f 0x8ba999bc053f308b56c0d5154089457b3972b971 0x640ea8117a48bbe9e50fb3f704e38f7d752da50d
