ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FEBBDD0B40B8
|
Infrastructure Scan
ADDRESS: 0xff33912734536b0e3e5582c73eac9408f3da16cb
DEPLOYED: 2026-05-17 08:53:23
LAST_TX: 2026-05-17 09:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 327d92a6…617ae362… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.76ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 3789… [TRACE] Call sequence: f3ec -> a2ce -> e189. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘327d92a6…617ae362’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa31d0dbc871143b055df8da10b1987ce6316edd4 0xf83e3456de6f22604db12c36f57de086dca9b1ad 0x06b2635e5d5e7354d7e154e422d509baff955a19 0xefdec47d3b73949a8b0efc7b755707f051d7407a 0x5664ed202c5dbdce29ba550b22f940c58febd635 0xdee2233543d1f29619f949b111c9988089337fee 0xba2732aaf7d8c00a6b919626a1fd89577c868c44 0xfdfde85007401f9b5fe8937037c11e5f0e3ea64b 0x14dacd534ddc676601b27f41eb541a7951524a2f 0xa644dffc50b3ddf746e695da66001e467adc90ab 0x68f6c48984639b7db2c50e691e96d060cf0e2353 0x1cb088e8411d933014795300e90d69efb963482a 0x7de5c25b99d5c9bc03629d9bca1c94034367deaa 0x8d54db917ff00e2c50a9d267bb09fa584b781f4c 0x97e53175d29c3567ee694f7f2374f29fa5a3982a 0x1595cd3e6bfef14163baa9cc6a79b9c8da8b33ba 0x331bc6c501197cf54dc9ed5cb359084445abde21 0x2cff86d00837cf496b5c551ee1c32070de718190 0xc55065d0825b7fe1cf164124e2429d2594335da9 0xa146e62b914b37db9e666c9a823708f0b17d63cf