ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6C4728D7148D
|
Infrastructure Scan
ADDRESS: 0xc2aa4aa5b591d58905d3696763106295accf263b
DEPLOYED: 2026-05-14 15:03:59
LAST_TX: 2026-05-14 18:50:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x9d08. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 4599… [TRACE] Stack trace saved to /logs/TRD-17200449.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0e17227f…70cea450’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa7c989a0253aa8ab5036422ed425442ed3e25a6b 0x3ffeb97daba42cdfeecb1200f190477c991c432b 0x3503a4250d5775c62c8e867d4f025471729ad26f 0x325c3eaa282f0065722a748794776d8eee244fd7 0xc50b750a816cb629ac3fd16988ed97ba3a62171d 0x3e45cf73f365a692f7e7735087d08fa3afc339c5 0xf50fdb3392396d06923f1971daec7f98dc33ca70 0x2c21e1abe40d7b3c50dcce89f122e915198f8f68 0x8c0767ebf391baf84399f757de31d57d1c6e337a 0x591c1a12447280911cf7d3e48e99cd2f66303095 0x379bc480dd7c34eb3a0f84f84259caf3afcbb5cb 0x078e0fdf274d2d136e839c7f7ae3e23d0a015140 0x5689e2246b55fd482a7ddf153eebf365b1cac9d7 0x436cdd559e671eae2007c083c4c8a6297d55ccc2 0xc3414ba26b535fca11fe9ee1d7a177b68a7b8f41 0xfb365e36d94014186c4536690d9d8c377ee852d5 0x328d28b02173dca0c0ec99c0ab96e8054125b881 0x27cfe7255247ebca8521ae9c645cdab0118caf4d 0xb8eac3fb4e8ad0284934f35e44ce696a8616d6af 0x0637e839dbff54e04dbd89334cfc0c32d5a13057

Leave A Comment