ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8FB386443A77
|
Infrastructure Scan
ADDRESS: 0x1f52d55c513d8ac9ad7a25b7586fcdff5766695c
DEPLOYED: 2026-04-29 08:21:11
LAST_TX: 2026-04-30 11:20:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x386d. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xcf4bcf73 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: b59a03786ba7b259. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x21908f343328b6fc6c94c1ba51f562d432832fa8 0x7425b4ddbe70d2c94ed2c4470cb7b6da3000c681 0xfe8f9c4b24bbd0ce74cee60f5d8b44f616f748d4 0x3b3e5730ad628067e9577b1195a6b18e95a00169 0x374e9953160dbaf4682730499d8eb981233900f3 0x3772023b19bed55e7230b02b29dc9693c2cbfe00 0x23efe3b602eb9872057f2db5ad02ba02134e1812 0xfb8e1300b300718371abd9a12e2dbdb4ee59ac50 0x417d768670882bd978f6e61343a788134c83440c 0x140d06e0e031995b842c0c14b21d9ae8bb035577 0xc70d8a99b915beda52c5a952e29ffe152cbfcb34 0x978e10fefe092054ba4881f580ff3ffbe3163214 0xa60e270958014c94463794d26f0c09ee2edbdc6d 0x3d96e9fe1f34151ccac94a028dacca9f5941192c 0xcc2030db4768ed06ffa87f1b08687c79f98df7b3 0xc396452b7bd7cb526d577482d329a29b57a57634 0xb975a176e2b021fd70eab4b63f1dfb22116e0762 0x63dc8569eb77681a5c387079c9ed66042b9207a5 0xae1d4445fac4a84a731ce517c74aea02b76efa42 0xc300939077f515bdbc460f1b46773356a59cfe6f
