ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F0FF03FA1906
|
Infrastructure Scan
ADDRESS: 0x460d7dfa7aefb52ddb7b87a767485325b31272d9
DEPLOYED: 2026-05-16 07:09:59
LAST_TX: 2026-05-17 04:22:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 6 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8994213c169fd27cc562b98f302e6f06bffd0e31 0x607025b99f9c233b14ea919c292c422b37535c56 0x6203baef59848ca465eae7431540bd2a44962519 0xe2921bad4be34a7382741feb665308a0e928c943 0x58a83da4c833ed7d1b32c6a64be55d4329f12438 0x0637e839dbff54e04dbd89334cfc0c32d5a13057 0x7f23ebc472c95a041ff86671d93038b7ecf73a13 0xcbbca0a0871a4f2a5567940c38a5c7fd6fbb6480 0x4801fad4cf85872e42227dc063c6cdfc616df293 0x0694cacd746c9ad1533a71b86e0e0c10aaeef0c8 0xed1fd7b160a26b72112ea862690281d0ca7214e3 0xc295218e46a35916dd1c3eac73cdd7a438e0b150 0x17bc4c53d827f27b9954c1e9ddaef8cd4c059436 0xa0acd0a68daf82b5b0f5d7ad56da72a49daea162 0xd22e41523ed60fde2c40d8d2a2ef348d3a3f919d 0x9673d118c54672ac7b1cbbf2397d6dd4b7e45f07 0x3e4a8794fe5ff707e33967b2adc193f5698bb7f3 0x58fedc04f2b61aebbe31c7510eca3881b2702f78 0x837dc9752fb23380b030a4bbb78ebbbbcdb74629 0x63177e2f543205ac1ed00e6f1b98d4bc2168f870