ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CF4D8B32F30A
|
Infrastructure Scan
ADDRESS: 0x65f09c08fbbc15827798eaa48fe3f23f14417e08
DEPLOYED: 2026-05-15 22:50:11
LAST_TX: 2026-05-15 23:58:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x7352. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-ACCC3C18.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4eb492a4ba25371964920d84a468cbeb1a2ed17 0xf92bc5ba0b2ae6a617fd7964226bd655fa387db6 0xec631ee8005bd7e70686fddfd8b1dafeadbfa236 0x6d8c90ee4bd6d5dad1e7b730cf84bef319e54a33 0xae5e5656e00613b76134131ad500cff771b28977 0xc67a7b00786563c3a6c0b761b087eae107b92e74 0xf65a91aa945d48815a2b79b3c37169795f1b330f 0x15d2eb18bc83cf27060cbbeed717f4b9e0cd8652 0x833c2dbdfb3d030eca17b1fd92cb98f1cd64c00c 0xca26bf2d5fe29ae0799c084240b430b2343a3646 0x5d95571e34cc83a7804a4da94610f7759e3f6550 0xb533d33b53227950951e5c9df89d2dc2a9fe1d71 0x8030c88a39cacdfd40f6fcdd106092c0e4d01683 0x6451b606c9a831e12c495784fcee0d23f784663d 0x9ef24560b03ecbe8e26f86bac47feb5fda6e2e1b 0xc7e4fac865f60bb585866906bfae3667caa6150b 0x5700661fb5c90d2e2ce261ea9cac2e7d0fabe35f 0x0f4b105199dd07ffc31c39c1be9e77e3a22fd2a4 0x481b6b9261562c1998c5e0ad1f1f6811af6b93b3 0x44276e9a34c3cf7e0221cde5de9f75057ec4126a