ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-064A8433122B
|
Infrastructure Scan
ADDRESS: 0xbd07f4a565e4a704f25d6c4ec00e1c76d12e586e
DEPLOYED: 2026-05-16 23:19:35
LAST_TX: 2026-05-17 00:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 83. [FETCH] Entry point found at offset 0xd93d. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xd56c8517a83254e3c3e4b1eb7be737ebaf6a9e61. [TRACE] Debug: 7aebe7e831eff13d. [VALID] No critical memory leaks during simulation. [DONE] Scan task 861D043C finished in 98s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x031bce71392f3f78f04983d6c3d84c244233f1d8 0x47e842d48388859aaf51c1a265b5b21b46078831 0x16f16574fb4c5eaf49a1ada2f92df8437d7620cd 0x0026684733141716673fbcb109285117e785e6ff 0xa8ebcbd45ae5c3f9dd479261d473b29cca0c92a3 0x79d953826d341b61d164fc83a3cad86473cb94a0 0xa043e9d6f593fc746d55cc8ab4a15363c9b8359c 0x7ec9e567f4b4f4dcad7291c539812e625948e7b4 0xfc0e6c95533869cbb30f81e566e2cd891a9e4a86 0x8fa214346b389d4fe22cd4444a89924958d11807 0xc95ed6cdcbec9e10c8612d3b621aaae6797c1eaa 0xcb1ce201d28bfa4073d66e2039e9cfe2654a3d78 0xa3191a3b16ca92e103f11d40a086d9afc2bec84f 0x274fece703809af5336d0578867cbe16f3c81d08 0xbdd9912240deac2edb65f84e1cd1f4c98b0cbb2d 0xbc5fe0d44d7a8d6ff6def9f8209b6bbdec4e787d 0x5234be28d34e24c854220ff517a5b9f8082098a2 0xcca9efec10c828e69e0dd595246a2cd4d3905a6d 0x84695231a52871fa0cf665d4154edf736671bbee 0x548784c0ec294e01fa7702d1e6734cc281f832be