ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4A330CBEC7C9
|
Infrastructure Scan
ADDRESS: 0xa78846573c4eda142dfe10335f560a5cf3486894
DEPLOYED: 2026-05-02 21:08:35
LAST_TX: 2026-05-05 09:38:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 19ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): beadb6fb…9c828bf7… [SCAN] Detecting compiler version: v0.8.21. [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2839405db98d4bf5a9b1af7b7378234201bb3e5c 0x882ecb6affb57bf1db20e36d3a1cbeab18d7b7d8 0x52921fb05200ebfba6d33f5f023dc6e3e525fb83 0xe3792993f2cf1a43f378faeb44ed589d311ae06f 0x0aec963ba967cd63f176f815a3737d7e7e1fe65b 0x34c134c77bb981c661359920154cfe777805fe12 0x333ff5aa2e5ee2d69872276af3fec71c3f447432 0x76feeb9f225264d0a8635100855f8bd719599887 0xe7b51dc39a066acb4f1d00090fc300c2bd121214 0xa0bb291bf499b66443583ca200fcbfb1057cafda 0x6c8a27e17081fda99766a699e7696b723bc282fc 0x3c8e0335cdbf6ef052fc28c34c5b742d5010669b 0xac61c2ddbb373d4e89f95750ba522d6bfaad64be 0xf8ae4b620cd5b7685cefa76b06eac74f35fdbd97 0xadf31ec048da6682860d00c8a1bd4aad03d434fa 0xb70facebcac99cfc9fad7df3ec1d5653553551c0 0x9a36767662625a80a1cfb81f3abd9e646ce56135 0x684e19d1ae7f7a02a14925be59c74cbe9ceb04e1 0xc9e81bc6ec9d6a3f5bcbb1c5ea1e1b6a8ea4e712 0xc13b85b24e3717e0e9c6a7b628932062e84bf953
