ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A2277D4D09D
|
Infrastructure Scan
ADDRESS: 0x5f1b8dbd3135c444f9b016f9fa19738e6b98a9b5
DEPLOYED: 2026-05-11 18:58:23
LAST_TX: 2026-05-13 09:45:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xe1b26684 successful. [FETCH] Entry point found at offset 0xa8e2. [SCAN] Analyzing visibility: 5 public, 2 private methods. [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 3591. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcfd592a94d10bd93d124e5590767a0806a5b85a9 0x5dde0def199eac37e633d9b0c3c0b3ba0f72f651 0x97f67c58a4549db45d43c21e19342054249807f9 0xfcec1ab01754eec606ad075941ae870357dec448 0x012a79259fb022d809e49dd7a8d77358621f92c0 0x783bf15b171934ffb9993b03100b7ebbaf362f85 0xa3784bd726bcc7d28364280c5b3f90b6a324d86b 0x85cc3a33c07f803e1b07775498a64ac075956fcc 0xb0c83777482b9ed13e79b246770a0818b0264b53 0xa01545d10f8450265b6ceb8133be60bb75473b56 0x7777777fa8b0b80b46e6ed2781f1ad03b198650d 0x7777774274d9eb8b07decf31cec80cda62deb8c1 0x69488923321cb7b0821695cbd6c2c7028a171e72 0x2bb79b72ecb15b3075fda7dd2bd5d1d7f214f66f 0x3562a8ae533c3de09fe11633f6070265d82861c1 0x5f7821c639a6371d6d95683de575a3fa9e03b5bc 0x40dd6683387293e724ccb4a424be257dc9a009b9 0x69232e98819f7ac4875d0aba5d36bdf74ab1435e 0xb5d7a3b3d3a4ebc2ec021056fd495c897ff077c4 0x89859140d53583b639f2edb932b44e76bc591475
