ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F85AE09FE86C
|
Infrastructure Scan
ADDRESS: 0xef57cd428709fc053656640db7c4eb48055322bb
DEPLOYED: 2026-05-10 09:07:35
LAST_TX: 2026-05-10 09:35:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 4C37E204. [NET] Handshake with node 0x91ca4676 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 42 iterations. [TRACE] Bytecode segment 0x0b analysed. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 4C37E204 finished in 32s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe59b76fff4c19e0b1338bc4254bef67ccfb28c59 0xeca605e20a80a9fa0aa86b773a22d973a68b0136 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622 0xdf61bc7725cfcb843049beab8c9d584996e7d491 0x845e3854372414443defb54e6d218fcbe5f7222d 0x70b4e2a88293ad233525c04a444eb2813af1f0cb 0xe8fc150195edf9340fedce9edc207fec004341fc 0x0b0d2b93fc4e67e967392fd8b1bb36da23eba17a 0x45e97b4c64f0ba573a5bb370d5cc167b251a48b2 0xbe487555e32a964989b8c3e38caced607b21d6a6 0xb3359170aded98dbea689e7ca6c60aa2f5f63d12 0x27d9dbcabd879a27e82945e58b7826328be62df1 0x2a28cc8959cda64a88de8c6cabe9278d651ee734 0x4a553c648a902476cfabbc69a03c7d3778bb968f 0x1147ded521c33c8ae84efbb3ad1c92e9e8c47b13 0x287cf56e5b1435ae59bf9ce6443f055a0321a063 0xe56adda3088831dd42caa99c703956820eb66849 0x07b3df7d63c3c08f4c70488f3d2335a7ec98f4fd 0x97205fba8e17e32c135aea0b0905b3a340996741 0x85f2128660a46bbe4e7937aae831dd466e0ca9c6