ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7807F5BAFAD5
|
Infrastructure Scan
ADDRESS: 0x01890d135c256ea92565c7aaab1c772fc225988e
DEPLOYED: 2026-05-08 20:24:59
LAST_TX: 2026-05-08 21:53:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): e176c4b3…b6ce2083… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x2c55. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 41cf -> 53ea -> 0b6d. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘a8e916aa6541fbe10df7f996fab5b7f51620e6704b20adecde7b03dd241cba07’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xde67a8bbd0b3118b21ede247588444af374450cf 0x47f2c4b83bf2be423fed8384150477589e02d3b9 0xc32ca3abd4126fc6c1d4e0ef3dee6b982dcdb3b3 0xef8d368c0e91fa9f53b93d30768e6881fb128ab3 0xbc5c59c5bdc327b21918aa00cb21846bfe781b29 0xae8149a9c6a6a59e5a6813886123d9bb57dd5091 0xfb09bac396488a01e0348219c2f343ba63929fbc 0xf7e44d036e0766b9b285cd92125a14f6742efa97 0xff79da55aabfae876833d2d66d9b95b0dc5ad6fd 0x760f23e7e48a1f6ed400e9539762a5b4b5130d75 0xcfa984db125200f06e7fe99addba50e8ab8b7645 0x29e75bb6a2e4896837f92b5cf77e8a1eb98ba8ea 0x85f115f459ad687a6e7f214800418c30894f300a 0x1a3394c84687923a3b7148177a1de19eed749ad8 0xeeb4bae3034a2411f1583ff6ad22d1674ad2a915 0x891c6417e95096edc479bd53518e351c4de31049 0x2c234c2147cb34bd7d6bcaf070abc40ba349d2c9 0x47fcb922d16e26f99441fe8f599568607a09feaa 0xb9205262de3aeba3e7a3bf11beacd24ba005ab01 0x9398186ff93329c1588a2689bf2915f17003984a