ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-702EA2342774
|
Infrastructure Scan
ADDRESS: 0x4513fdcd21f3c01030eff480ef1410ffb96d92bd
DEPLOYED: 2026-05-16 13:09:23
LAST_TX: 2026-05-16 13:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: FD5E74E2. [NET] Fetching raw bytecode for 0x4513fdcd21f3c01030eff480ef1410ffb96d92bd… [FETCH] Received 11 segments of contract data. [SCAN] Identifying function signatures (0xb73aeb43). [MEM] Tracking pointer 0x6e90cde2 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 9811… [TRACE] Execution path: 85% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa379af6bacb145d901bb73f1ec3ae7a9fd52ee0f 0x1e7a0773e64027d6dcb9f4e1320e29bbbeeca326 0xcc262f57ad9b97d25cc0329b7ade9ecbcaf4dcfb 0x46c8bbed7147c43dea39bae79ec497a41f29a152 0xddc9d4b7632799cf3cc698d186ece5d402819879 0x033feb307e90331faf181edb1a060c1b72467ab8 0x5aa5750de5000387d4f93620a67a813781c02963 0x8825a9b7359063c5fa7ec454f674a6ff2b1f7aaa 0x0fee65a15b5a07c28ec02d9133e9fdc2ff601187 0x798b308a8993f16fa1118f312a03cbe3fbf82cc0 0x25fcff8b3032d74260a5155b29901eefd9e41371 0x560a0902f26a92d9ef1d3d0cc323151cba26e628 0x78ce67de9854f9cecec3e3bf31b12bcc39a126b5 0xa715ebe2934e77942b9a93fd9632529de723ebbc 0x4f5a6caf9e517d51e1d7b29654fa0931c1376510 0xac7e8d0df30f65022e08be54305539833d36741a 0x6cb15decb3c8836f18c6fa73a6bf1a46164fa576 0xf48cb42f21f9efc0fe9932a9e48633a728f69d99 0xb94a0798cccf6e4f63d2220a678eafb2bfdeae82 0xa53168260529f6d63d9d325936db3738b3949ff5

No responses yet