ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-75D12D421F95
|
Infrastructure Scan
ADDRESS: 0x74bca5649f0396fb09be3a8015732f2115776f85
DEPLOYED: 2026-05-07 02:13:59
LAST_TX: 2026-05-07 03:14:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: A08425B6. [NET] Connection established. Peer count: 12. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x6796. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9a6348a90353e5ee746567b4d1be4632940ef343 0x7f27bd12e262fa08aae74f3d3985525b3ba5d0a6 0x9a11a9790149150330ba1c65ecaaa311be12f5d2 0x780c4bb5dbf3f744aea677a4d6dc456ddbbeb4dd 0xe47244beb2832c0dcbacdaf756e5b46929d4c5a7 0x06c08d67f3eec0cf3747aff6bc0dbf16308cd6d7 0x1bdf3ac6b03feb5ac99ebe9d430c3db8c06d293e 0x40db134171f2a9855dbe4b211ddf2f5ec71d98fb 0xb3b515bbeb552c957e7590b15d4f90e0d65675e1 0xa6cbf1ccff66486e3d3de146ad506921dbcc1317 0xce440faf06b05952ff04ae22d2a587cd7122437b 0x6f5130be6c2f6b3d368a4c1d5dfe4ce65ba09761 0x513f53e4d1fdbc2aa10f69454c9e23c6c3210071 0x13c3cbe02575108e7f86577ba59533e9c5441dc8 0x5406ca9449af7481f788c574246bbf9e26b1c2f0 0x18c962c3369e103f84fc05f9a0150c9295c4228a 0x45561bcdd5a40eaf05053fe23d08cffc414815e6 0xc52898450e751b4c230d1e302eb6e956f47b3db2 0xc1d34c3803dba10f8f43ebc09d81845c8a97d86b 0xb3e0c59fdc0508647eae3564b593d5d173f86ae3