ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-17170F5C22B4
|
Infrastructure Scan
ADDRESS: 0xa0a49518e8bbe30162dd3006abfcc7d8d9956779
DEPLOYED: 2026-05-11 03:10:47
LAST_TX: 2026-05-13 08:39:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0xe1af9b46 successful. [FETCH] Bytecode size: 7138 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x040d76c8312e6ce059d13634fb68d2a93df64aa4. [TRACE] Debug: f1f4088e829c36aa. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘baa93013…72f23330’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9adf4398dff5706c1deb320b7f3b9649f3930036 0xf470391b200d5111535374bfe8b77f88e9a86489 0xf26e06fd10d50c59d0dee6879b56a757c5d2f727 0x7b826d731f8d245134d597fd0253cc87f7ca8e8d 0x3c42f7ad7f4172ae0015a73ccf479305e95de5ac 0xaa136f09616bfceb74b72e95b31f64916839c0ef 0x4ee933fd06f2567a912d69acb63a9928fac94313 0xb3044c2034e91c660b6834bc80e761e7138cee73 0x0767f850bbc6dced22b7d501c6b2fc73335b70fc 0x7d5fe82d41444db0f66ba3c42f72443e6d808d96 0xaaae8273e83d36837dc293279bcc22e63acf16ac 0x3af30f652d328d26dcdbd9952f1c22478a8a5e9f 0x549502027f2ef6a973b8ed30fcd023275c057100 0x67c85bf193a7282e1cea0e040fd15e2dfe6f9de7 0x83addf92e3644f0c1ad137314a3c01d54fc7c824 0x226f697c217826efd490ab4e008d734b017d0615 0xe129ddf0c17d7c392e40714494cb8f41d6130861 0x4258d299f566896c6bdf7a01a162e1d3cd695233 0x192c5fb4c3b48192b230b6e32c4cff88990551fe 0x8536f163970200af48ef479360ba2ffc8eee248f