ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CAE626CD8FD3
|
Infrastructure Scan
ADDRESS: 0xd87fa78daccc76730c0fd082122df83c3941b6ea
DEPLOYED: 2026-05-15 01:09:35
LAST_TX: 2026-05-15 01:38:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: EEDD8668. [NET] Connection established. Peer count: 82. [FETCH] Hex dump completed. Entropy: 1.78 bit/byte. [SCAN] Identifying function signatures (0xe0d3ad54). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x5b8fa35ac64e3af52718faeb637980a91582c7ea. [TRACE] Execution path: 76% coverage. [VALID] Finalizing audit report for 0xd87fa78daccc76730c0fd082122df83c3941b6ea. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xce3582d527eeb5275ef22c71e24cacbf7ec90a18 0x2d8703f371c4ae3b0d06cdd38e51e8f264394623 0x0e307d76182dadb10a8df39f36f19e84d435716c 0x625ef263efbe5ced149a8f96748d3aec5376948c 0x22833067f09a31e5ad6b42493d4a2a2e4051a1a5 0xe2a34ecd2c9dcfbaefe017834378c31543c8c584 0x95a91c1e055a565b0f8fff8591690208037ff757 0x058ac16c0acf8acef359baf3c5287ff812f696ff 0x1ef2665363fc7adc6f7d829a39e3d4544b2e9e0f 0x518d9d8f9f78edb1e8ffb0f7b2dae54da006f82a 0xe446368644179ec0bc97eebe32f2c09c3bbb233e 0x083ba39ff24654bd89e35f04bd66ad9911fa60db 0x2483d2cc2762ff915cb6b0aeb98730c3bc725b77 0x42a5c6aad312658123f7fd6046709e4e9a4e54f7 0x72d33949513cb4c8f5a4514fb77c497913cee498 0x7c641743edda6e14ac1c694673e45775e267261a 0x441d09fe07aa14c7f96153910989440645192a4b 0x1b18985abaf339f2a4744625a9696978aea53a32 0xa4d58d101878b182bd12192193cb59fa0203de4d 0xaad5ed923d14c6be4cdb800d8e2ab2e8382c5edd