ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E257F3AF57DF
|
Infrastructure Scan
ADDRESS: 0xa983a54ab5a5e3e21c2c63159cab31aa169b546a
DEPLOYED: 2026-05-14 12:54:59
LAST_TX: 2026-05-16 20:45:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 3.33 bit/byte. [SCAN] Detecting compiler version: v0.8.38. [MEM] Virtual memory mapped: 0x0000 -> 0x6765. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x6138f90bfb02d89cdb8041be9ca3c0bf0eabf695. [TRACE] Stack trace saved to /logs/TRD-C538F405.log. [VALID] Consensus reached on node cluster: 6/10. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0a0a55ede70eceaeb2c4af1cf9e76c65afaa473c 0xc05d442f4e0b8c1f5afc21a89fec0a0878337c22 0x87b42c473e6a9e9229506ccd9d8b1ddb7c9299ea 0x644a198e2bb4271fda9c98fe6d2bbc1855e25f95 0x9083ee1f912d34c1ac1094343e922bc8aed740f0 0xc46d0774f0f94c9406c5b68cbaa8916428c531cb 0xaf2ae35f7be781595af04c18e8fb6a98dc10fd5c 0x8ed874654f49a0cdaae6c5811c093b1080547806 0xab5929d6320bc3875536df6bcd9ed16973edbad9 0x5eb050e198937b0a2608b676a5275cf54ba69130 0xb7657e703bd7898e72fd0413aaef3f28f00c0564 0x7bb7366fc25f06bf494e0e74dbf2365d71310d4f 0x219cbf201c62af09c6c07d3b2c69db35767aaf0d 0x94d91032a53dfab23430233020d5680478607b1b 0x134fd9ec05e5a50f753a4c76897291b355b977fa 0xac6a11bd78873920d301179194b8eb31a8778e0f 0xcf4bc4ac10830ffbe0000e0874ade2e50d048752 0x048c440ab96944482d5cabfb7418994e8a773de6 0x71b7b876f115659a1db9c578c937c5fed23d3973 0xb154a2bb7cff1100ea76a7e58908b938cc6a697b

