ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-343E8BBC8650
|
Infrastructure Scan
ADDRESS: 0x6dbd85a2ca2c131ed6171044c32434e60a20a35c
DEPLOYED: 2026-04-23 14:55:23
LAST_TX: 2026-04-24 11:18:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 67 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Balance check: 3.85 ETH. [TRACE] Call sequence: 22ee -> e2b6 -> 1fd9. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’64abab6ec5f6a3e0781e6d8e4b99fd20b0bff31ba4e961400fd5948a9ca3a0f5′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x221bfc43d4ddfef515b754df038f8457b09fc944 0x0122afc8fd7f1886a6ee71c8f79ce6be99d28eeb 0x7fc1a8b598b5601c04b0ce1ba1731525722fef38 0x71cef9786ccaa61748ee8be9e514247acdbb26c8 0x1f06b717c954f08fbfaa3b3ccbae460c469aa992 0x510962ea0778d4bcd63a449ceeeb3454ea634bcf 0x5a114283d1ff6fccf4e5a66e1e7eb5e3ad7d8f60 0x549bce7a0456773122213a5a50ebe92a5a37c56f 0x915e253852682ffdd5f8557473b4c08578b2f2c3 0xfb68979ad3c54da6fb65869ff2afda4e7f9880a7 0x4231a4fb716a8f14e5c13a4329a9dab6c66dace6 0x365134bfbc7e6fb4da7ad9767a79a057d8c3f465 0x4997cb860a7d6beca6bf1301c9e490d4ba4b3931 0x53e53de77f6ebe09ebab8d1cf2ef5b60a4dc64f0 0x0dce4caccf15973221618e4c017cd45d0d4c412b 0x57ba0a40436401cec224db92bcf153623d99fb9f 0x4472f300310e3d2e200c9a86a7f36a123206f8b9 0xe5fb9124dc95ab098bc36afd6915e88918b41c6c 0xf013a4738f9ac6d36f1f6bb86546844f1f495f9b 0x84ecd8c4b989c3609a3be53fbefe752900edd2c7