ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-24E96C6FFC56
|
Infrastructure Scan
ADDRESS: 0xce4a5d11fad8f04d76eb65a588dc6a2e2a734255
DEPLOYED: 2026-05-10 05:09:47
LAST_TX: 2026-05-10 05:53:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 97ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 2970… [TRACE] Stack trace saved to /logs/TRD-CCA39AFF.log. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: b4a12955…555cc468.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3c8b14f750e7c70e269ed59f3b9b32aceac224fa 0xf2470d77dfb88cfc5c6613841067a4dd268de253 0xac61741db13c4bbde6cfb7d5c424df66c0ddc454 0x8533a9cfec85f8d92c47ad5a38e1e95a62b3b395 0xded7941041e6adc44c86cf3331eb2bf867084096 0xdd0c868207212d20a9a83c8351a41cc367b5ef3c 0x091d12182087f1b0d38b455ee333fccb89918eff 0xdc1f6bd414062e925653cfc5c58a9e74830b207a 0x2585128b6beefcef3c1c7c483a94ad39dfc1fbdf 0x9dd8256f768734cc76ac2d8395a1059ab8fcc7b2 0xd737c7f7cc7dec4e5399d0fdb1bd82f8aaf48152 0x5ba59b44b5909f5e6f8d469c727257e525c000b7 0xb64fa1429c69c96ea020da3d2d98596263d35ffe 0xdbe26046b1ac9536f7847cc93a256a8b10a4dd03 0x31fa248978fd5ba29dd41eb67618d1754b23f6d4 0x2b9dbd973e4246ea385b8f20d6c3fff58b395512 0xc2523b245ee2ce7a0c65e2fcf53849dc59c9a0fb 0x207e91a62205c66b57708be4952fbf9449baf6d5 0xf539431684360939d0b6e9a1968fc6fe4c7f17ed 0x5d53b3bf4d4d1c0df8e079d40fba671ba1f771da