ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-864BD12656A3
|
Infrastructure Scan
ADDRESS: 0xce85f3f0032ffd037dd63bf11f9137cf36cb6df2
DEPLOYED: 2026-04-29 13:21:23
LAST_TX: 2026-04-29 13:42:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xabe560c7 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xde5df0ae162bb2cf8670769e77385d2114f00dbc. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x02e6ea386b0f64b7000b00a023898b5b6063f3d3 0xbd5ae389ff896c59d471022df4e1eacebfa54e99 0x8621f3857be6bb6c4ab806528b427a96a3c59446 0x747c3bd823fd2c534688dc56ae8bb42d8adb7231 0x00a201c4343005a971c18c89874a718a9bc84e66 0x3bf627e0782c85ebb5f6fdec6f3d656f39e04b12 0x9b506af8c953fa7e825a264167da6ee1b5e8cad7 0xdbc41f6599dfde58d47d27721f2f6ccc9d5c2669 0x5a999e11a6959dbaafab93d2f64cd82497891681 0x3a07d80c43b6ae6053bc6a971fe98527ab80717d 0x614439e5f4ca118a65c7b87faffd3f95cd783c5a 0x279b2b57aa06fcab8b68ac04e57df2d3e46d2ede 0x61844714779790c535fc4b0b45bb06b8221b9814 0xcc11292547deb66edd68054b8571acead7cee349 0x197054443e8cb0bbb5f34a72b7c5fd7889de3f6b 0x489f8a64517821a174abb6723f31cd5834fad7d5 0x0a778f71c90bb38deaa3f399c4e9d8823db90cdb 0xa0c1b89461d114e2c561375d4a144c93a64018ba 0x0db40f43222fe2c3f08f455307146fe02c77acae 0x68fc5ba347581281552f373a59d8ea08f1c47f3f