ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-70F5099CDDF2
|
Infrastructure Scan
ADDRESS: 0xc36e928c4af933b0e961c09edae63e6ddb42104b
DEPLOYED: 2026-05-08 17:21:11
LAST_TX: 2026-05-08 18:01:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x697c. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5ddb0012a7d6901e95a9ccd1ea1b83de8068de3b 0xa5c0fcbebb0edb6a7d723cf03d1a19d3cccf0245 0x76ce8e4527b7680e101c574cf682900b96d59980 0xfdf3b201a607fee7c5efca151bfeab0353cfff5f 0xd082543696001afa50654db927f673c2b849da2f 0x65c02b9b67e410515728e051a5e3b5986dde3601 0x716f50a70b1a130770801db11ae1ec6365bae528 0x5de6e3432e11fdbffdcb08b582a1b08f89dcc921 0xc96e40098094e9f118248a76ab1dead9196ebafe 0x4e8288829289c212784e7c9ad5114916c1bd92eb 0x15d7a3bd3468d7e2c645c53f3a53ab058295925d 0x20e957da6d505d5080d0fc22416c6cc81a053881 0x7b9959cf0ab5950379fa060fd0a730b5b10cb570 0x9fce08308796781c8681fdb1cabb37bfde049e19 0x1af71efba31e521a49aa84f1dab361ee69ec2e2c 0x56f744934414a6033153a80fae3e2ef494a7e549 0xa971a5eb1f1a1a35eb5821b8afe8e6a83d9b3030 0x746305b3abb2ad4a3f759be20407205a9b3e7b6b 0xe023cce4539fd01924d274f9756368de51b664d6 0x7268fe665aaa9e3d0601d57064f09df1f6c0779e