ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-782B26E9F605
|
Infrastructure Scan
ADDRESS: 0x930b04461de9974fda395e9f9be9281b31c48ce7
DEPLOYED: 2026-04-27 09:12:11
LAST_TX: 2026-04-27 10:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 7 public, 5 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xb872. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 7015… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘d8b9794da8cd751ebba449fa59e0f2bf1c0efb40e3093a3f3bcddf2ff98048cc’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe833e3de1a7295d5687b0329463b96c9d2117fd9 0x116ce37ebf82f182babdd6e8c5b33c4a0d16a232 0x90c2003367399cd8fbe0c7d2d9a1f4a8217de426 0x057e3efca6f9e7094584b176f3e69a4f4b594d04 0xc1b6a630ae2252eac7b0b8c7f4a174b4d7f51023 0x86feb217e0639ddfbc70957d5fb9e37bc24711a3 0xd5869ea089c89c91cb914e95b778b8989f88cad0 0xb638473fe2e2ac93fd36f9dec9e69734a6a382cd 0x12fa7a730f649ef61177a64bdc7fb390efb6337e 0x08cd8701d2dd1989faff0a62fe3b64d1f9cb0b0f 0x205cbd3996c140ac64f15f94317a28b899b85444 0x1eefa923e36f05bcb6555df5a65894024f898ebc 0x0fce42f19e6401a79d661df13ba84dd65fa7e6d8 0x184aea31fc528fa2bbdd7affef3dfa7bb0e57179 0x994dda47d0655cb7ce7b972a7fcfcdcf7f1a9317 0x05f17b6cfb83612c65493a4879f5eafb244b35a1 0xa3dcca944037466e4c7511e81063a2f776a6b96f 0x63c154bac7a90766a70853d89ebfab59af57c61a 0x784be3f0777e4d4a8e2a8e892bafc5a6eb69132c 0xc3c3d817a6b77539d725ebe53c1fcfe0cc850199