ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F5E1570B1E03
|
Infrastructure Scan
ADDRESS: 0xaca24db95f6e020a6883b14451b93fc855a13e5c
DEPLOYED: 2026-05-13 15:18:59
LAST_TX: 2026-05-13 15:37:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x9e. [TRACE] Call sequence: c890 -> 059c -> 50d8. [VALID] Signature verification: 0xa587bdf242d7af72e8fc9fbedcd201e8ca0116c23337ad7250f3a92fe4aa119e. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x242830ee83f66f82465dd6c0321272110cd8064f 0x7ec9e567f4b4f4dcad7291c539812e625948e7b4 0xe1c87f153d0cce936f7e71b40fa3b584ddf8e76d 0xa1aa29447e7782d5e6e5314a214d0bb3e79851e3 0x467d96e5908aaae602d992196fc2425337c2a311 0xb2d35f0f98ea0ac2a88ee0967efa2996bb75ffc2 0x14cca4804432ddf2fb2c0c41e27b0e239ce1d7b5 0xbebb24fb67049efe1cb5dcdbc2f4f6ad2ba1c985 0xd2cd7a59aa8f8fdc68d01b1e8a95747730b927d3 0x9cdbb94287609600fb359726d9db80e0fe3e97ed 0xb8b0dac4e8b50f19d045388ff5aa76b2c998d594 0xd6ea218c70926fec4bb05dcaba83b931fe72a467 0xca9e7db656001ca75bfacf0dc93c9c10774380d0 0x825141c9ebbe1047e1d8f876bd0e52c96d6cb6af 0x59ec84057512fbc8a2de668275ddb72bc623b1be 0xca1597d60fe774dd022d0ebecc2a43dfe3c14b8f 0x00cbcb06add4e42e3080696081c24216562d768b 0x7f6111fdaf21d8b81b14068bc58dfa74233ab41c 0x450daf945e9afad49c125b9e85eb81ff66435b17 0x536470a61293493cc3a081566a983b3fac0ed463
