ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4D7A04A2764E
|
Infrastructure Scan
ADDRESS: 0x615771e3510a5898b38ab46da2f5b4ef67a2f077
DEPLOYED: 2026-05-10 18:17:59
LAST_TX: 2026-05-11 15:26:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 5578 bytes. [SCAN] Identifying function signatures (0xbd754b0b). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x51. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4549c015bbd7b1aef6fb01b52637123f71c17046 0x27346c09a9bd3959a61d43e694ecc19a9825c5b1 0xd6ea139e3b354bded42e9362bbd6e546073aa4e8 0x6c9f73ad20d836e1c71144972be32735e6469365 0x3d017c0dee48627f236b37b68152b7676c9cfe51 0x328d28b02173dca0c0ec99c0ab96e8054125b881 0x65bdfacc00fc2712a49d318d9a508d9046466fab 0xcba0e69ba82a186fc3f2cd5f4c35017c548cd7b8 0xe74b7fb06bb653d70653d7fb6aa3403102586d0a 0x7dcddbaac3c493f7b6e8f724bc8ef25353e8bc0d 0xee9d1247162b35b557abb2465d0626c1231c8751 0xf2d266e4bf3f95160144d9fbb015fed8ae2d5ab4 0x221b24e0d92bdfdfba04d3f3b23a96059d9b8762 0xa67245fdd405ac165b99639f038fc0ffeec21c36 0xe326f8dc7e46f649bdeb7d92fe0b082ee5c1e271 0xab050dd50dc8192e1a32203782f53f3a8fb17f21 0x3e3eecf79a3a5b9a02b00b230194ffbb2c5e9bc1 0x5b0a0766904ae859010b46c5c9c7be646e510a0f 0x2f4783fe50b2fd9a3929e82791021536c5eb3159 0x62519eaf8effae67b2bf5a47a8bd68a180e3da2f