ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-59E608101336
|
Infrastructure Scan
ADDRESS: 0x9e464d954e07abed84081f399fee729ff99f8f93
DEPLOYED: 2026-05-14 01:56:47
LAST_TX: 2026-05-15 06:28:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 33. [FETCH] Entry point found at offset 0xdf4f. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0xa6aca5c9… [VALID] Finalizing audit report for 0x9e464d954e07abed84081f399fee729ff99f8f93. $line = str_replace(‘1CB8B573’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6fe0286b1340d5a26b14e74501cc3f0d6f224e73 0x671bcacd2f5cdfcf5d243f14bfcc07ba8791e063 0x8030c88a39cacdfd40f6fcdd106092c0e4d01683 0x61ed679d7a35f97a7698795749530142a29cfe07 0xd9b076a960b74ecc17ee4c76a29aa9afff19f3c7 0x39b34468c34c1a111ac0ea20d8eaa26f01204078 0xd8e058041d50032d8e30b456219ac2b275ee5fcd 0x5856c70069e2b7ee98b9ed0788684f912a147c96 0xe5ea4fc1031340145f42e207d2fa1c94ce0adcbf 0x90899a6b71f6379a0468683739edc8e730fae754 0xddbe7d15f21dcd2259e4c12deff0b52c5adc3058 0x5eb5d952a22c373553b8ce024e0d7464235fd35e 0x5357a41779d8d811be2d089faf5de4e0ac562e31 0xc589179b18ce21ee3fbc3b93d281eaae92e6b3bd 0x69be9a4e9f3da5bd63a81f1af9e6222489399b3f 0x2f375618e16abade68b113e38ed2d1ef5adc8530 0x8da7886f0dc0ba681b050ea9dcf15e08540600fe 0x6febf518a403efd54a2cddf304ee05a8de0621d6 0x0576be143eec5c8727d37a58fc918a0b3cf00ce4 0x6f98636748dbe1e74b8c556d4fc2c5a65493a90c