ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C30A4208187
|
Infrastructure Scan
ADDRESS: 0x68ff3827b7db95e277a8d5a75ae95c8efbd8e134
DEPLOYED: 2026-05-12 15:36:11
LAST_TX: 2026-05-12 16:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x68ff3827b7db95e277a8d5a75ae95c8efbd8e134… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for 'DELEGATECALL’ and 'SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x3c9522aa142e98ada08747c57690d0d05b2a6aac. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 925CAC48 finished in 22s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa98326012c86f9e6c0bce0a05005b0449cf9fca8 0x2bf51b62f40eb02c9b6a8ce3803f5208af983102 0x3f0df8502fc14b857bf0ed44d82db3385327086a 0xa1ff0e250a9ba3fb5be9cfab1f745f5b50469efc 0x4e5545c4e82faeb7976ff4d10669fa45479c2dc3 0xd0ed2d8c3d7ddf2afd0efb68211431d151ceda4d 0x62a7bebe90f79160468407ae587a4a4854a246f9 0xd1ddc27df247522b02943a6debd5295a78012e2f 0x2789ec8f6c98f32514eafd371db546045e8740ce 0xd770b366d19dca69111e3c2f9857c4b22f5dbc55 0x186502fe5329ffd3b46992f30b2fe4bdcb694d3b 0x2a8e3b8acce07a43b76fb6b48a455127cd22c975 0xf8bafeab6c1faa95051c03ff5db0cd7f5a242eaf 0xcd0a24e13dfce2bfb4d34c3c0e866d5b2b12e0e7 0x264b3d6763f2cf8bc09ed6057700dad3131c2feb 0xad8d628cd008029bf06e4a785210b8f7f2d4acc0 0x08eb0be88eb3391d2f39541e42fa7e3c97dea73f 0x5aa1508b97600e77ef647406191ae0e06b979253 0x8e3bc71be92ec23fcc20f183c405d7ac054f6f8e 0xeae8a7700d6292b1945d54aaef34afe44d5a4d72