ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1ECBC4F51BE2
|
Infrastructure Scan
ADDRESS: 0x8778da25d4e6a731b14b40d626b768dd47ec003f
DEPLOYED: 2026-05-12 16:03:11
LAST_TX: 2026-05-13 00:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 69. [FETCH] Metadata hash (IPFS): 51f3213d…6547432e… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x0c46. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Balance check: 9.14 ETH. [TRACE] Call sequence: 513b -> 639c -> 7b05. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 51f3213d…6547432e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1a97b24c6e16dcaff8c08748c47870d46155fa0d 0xe27900c6b5f9ef28fdcf1ab33d4184b926569cee 0xf3a996dc20d1bebfc7bc769b6e13c82d7ef806c1 0xd1b8ba7506d93af71e9bc8b0d20c4030d59d04a3 0x1c34d3942ab4109fd94ad97b3f1ecc4995dd176a 0x0aedf88d8324d8e01ff6646eac0d9b85748eff2b 0x42c04ac4dad3af5133c4b52d2463c5ecba0f853b 0xed5440e0a9bb9233f4252964a47007c0049c013f 0x3e7ac407e37dd9575541eaac14b5a247526330ef 0x8255f805ff3af99c62c78455b1917a420353be48 0x972f7513c15f03d390c30877c3614ae251e8689f 0xde0be8538fe6af69a38baea73b5c446c1acde8e0 0xeffe1841dc0d5573d2d6ca86fbae0b1f5245274d 0x69ea2bc0f9b446debe0b4ceabecdb2a6c3b6244b 0x00000a4184e9b3992568faca944e9608b7300000 0xb853de1ab137353f6feb7e99ed49c1864ca58065 0x5383f861ef83d6bb42e6c946ff48085cf55a0010 0xed04d7fa841b456b8deb28dfd3195786b2b8fa0a 0xfcf81f355b6e386f0efed3505b4761a92bc97bee 0xf469480a3ac2f42e17eb40fbe84b59dcca24ce17