ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-13DA0DB06E0B
|
Infrastructure Scan
ADDRESS: 0x7a316a269e7e84abf891152d5b528160c466c2fe
DEPLOYED: 2026-05-11 04:43:23
LAST_TX: 2026-05-11 05:11:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 77. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.44. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x45. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Scan task C8DAE97D finished in 10s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x272ad9249841b37dfa07835e279b72954b228fc4 0x958b88b8ec8573abc7b06b3b144cf3ce19e0c057 0x212214e029ba633bf3f5ea86356f13ef73f881a2 0x1e485d34fa3f2a34216c1f89e9b850bdfa3f2a71 0xd0ed2d8c3d7ddf2afd0efb68211431d151ceda4d 0xd9d91559a582e8228b656304fdba8c81394ef832 0xeea6841369e5f1ef88273f03c4aaf65ae4486280 0x28d70f1344aa846d87f94bfa8a827f98767d6db6 0xa94f7bbf4f712e37b7f7616c265667aaeda98aba 0x6e810d5c33a4355ce1b4107f5722787bfd7acf24 0xaef10baf3729919fe5b0527a36a973a3dd767226 0x0d267dc37929462fde83bb1baf3c89e4b8ac1b47 0x81669759856c1404e0afe7710ba740b96d2f1361 0x641da5613a65d45942b53381e3ce4e069b15b2a3 0x0f69bb8b283cccf5d50c95594ecefedd707aa11a 0x706f89ea1e4ffd2558f2ebe90e6f0bc6841f9ab4 0x9349fddb26df0d1b20034c352ebd2b5545b1aa8b 0xbc3bef455bbf8e4e6ba30d901c16c21766db705a 0x39181749ce71f8f7268444a6ca8b455256d20de2 0xcdc94e934efa33b54a99f004e62ecc75caeca515
