ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8D1C18C3176A
|
Infrastructure Scan
ADDRESS: 0x160960fe96d3d61d606c4ce5d39d0bb63758303a
DEPLOYED: 2026-04-29 16:23:11
LAST_TX: 2026-04-29 18:40:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 7149AC64. [NET] Connection established. Peer count: 89. [FETCH] Entry point found at offset 0xf0eb. [SCAN] Analyzing visibility: 6 public, 6 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x501ab843f8add0d25418d66af59f3fc3ccba94e7. [TRACE] Call sequence: aa43 -> bd64 -> 0a93. [VALID] Signature verification: 0x2dc479d22b7a52f7dc45e2afbae538fff6794e2b88f6f8ec7729a241410d13cf. [DONE] Report exported to IPFS: 81c9d925…1a790fd7.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x82547a7a5dd6e3b4a2d13cb9348e6a1729cc6453 0x07e94a82c2da6be1e0675eb4bbcf3a7b15378027 0x1b6089ca04700efdd39c5463935fb9c6ccb567a1 0x2e3ea7104772954ad387d7fd16b7d9a0b69eea29 0x3800e1e683a0b09432ce1b2f9c2a458788737c6f 0x5edea22c386677c4dc0e87702a7a267a16cbb546 0x916ca784b88b9b1df2da147102a9a5561dcde009 0x41ff8e332b59f37545d9e904ddc2b621466f8580 0x2225ab651ff7c83459fa22a6545ea166dda9f9a0 0x638b2e6c64ec87e46e65e9aac669e223a003cf8b 0x815992297e623e6a181858c5c7bc0ffbfc381156 0xc32cfb93e8a69cf61d6b0415e554da2209c31e73 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0x132d268892e7694e0ed412d7b807d776977fdf6a 0xae49eaa888820db6606ae4878ec9056bb9874bb0 0x02d386f6071e4cafd3aaef042cbeba461e5008c1 0x877c5189d5fe5a446338799abc65d3035b29d9de 0x970b344bdd1188f09e72094386ac2af85025ba92 0xe0c397708ccec47fcb7ee397a608601903294e8e 0x6e1d13cad41d4ec8945b0f4be84176f993c5c546