ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-470E650693C2
|
Infrastructure Scan
ADDRESS: 0xd3e82845840218e4752401edd45b67a5ce977542
DEPLOYED: 2026-05-14 05:52:59
LAST_TX: 2026-05-14 06:52:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 27ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): acf7b3a7…700ef84a… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 83% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘acf7b3a7…700ef84a’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbe20ede0c58c1dc8fecd716bd8be84dc623dfef1 0x91e8351e01be1d5cb25f153c1e74741c03603342 0x93ce592f4263c1c178a240db29b37bff9048784e 0x2820491fe21341e9d2cebdcc6199da6da66a9b4a 0xe32d849d1fd31f17bc6798713780865ab5b450b7 0xf48a33a15c23dcaf4754328591d26768b0e31494 0x78e056eb7032bc39c2849ffddf639cb77cc0dc03 0xe1b3389231a6cd25f83b1d28b810a0c421002d62 0x8875674f5da8edfb69648cf86e9d4d7af7254e61 0x64beb438814cf459a3e6a6791444dc6780c128af 0x8d2c9ad18bfb5897b1401d3440954aa5eb9f8605 0xaab657ae30f7fb63f744f788538dd8b6790c699e 0x201189218c9dac4c51e28b793a09d604a468738a 0x0f45cb4eb8946e37b2a97732353107bf990a24b4 0x6e3fca9d3fca2d51792f260ab6a2995eef57a171 0x4c24a3b331e1ae4cd6d0da0f8c53627d461b6bf5 0xa13c09bbfbf610a6101f660a8f9f407d486b850a 0x3f589c8ab3a927f91e927b38c3d5ad751549df1e 0x34b9c9a7b716c396b43d4ab024cbb5e90acc15f6 0x00174d0e5d4d8949471cd9075d8ff969ea64398d
