ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5D21A91AAB7
|
Infrastructure Scan
ADDRESS: 0x2ed526b627240971ebf316d60268c0dec824e354
DEPLOYED: 2026-04-28 17:36:11
LAST_TX: 2026-05-03 07:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x3349cfb4). [MEM] Virtual memory mapped: 0x0000 -> 0x7f07. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x95ab17b8a00d9a6a96bb955940cf65db61c523a9. [TRACE] Debug: 8a9c9c66dd89d22b. [VALID] Security status: DEEP_CORE scan finished. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd55b268b1b8cf5cfb709df19d4953cec6555a484 0x5032e0d3041db2979466bc6d9f144e7d3922874c 0xc54291ae4e0293943831d91eca037d7c30792e7e 0x4335dd5f878e44a687ef8f714e61dbdbd2db206d 0x4fe54e5d590aeba7ed855c317622fc2287a28ec6 0x1bb9756886aa27c88cbb787810a2bfc6d34439f6 0xb11d9017e991114e3cdb8fc7d07f903ffe9dfe76 0x6b54133662f95af529b3f48524308b6c952badec 0xb17f96ea8d9457dc702884c3e40c6acbf74d2af4 0x14bbd521f50455b8e734ed04f91a600c53bdb0cf 0xc7630ee8431e7d748f537d587aa236643e2282a5 0xff928c3e0255e89252ea98da12b89cd4028c64dd 0x904825770cdff1623fc1eb58b3f59f93714ec22d 0xac1811153607df10005507e08071115723f9d249 0x8319616c02e619e33e711d0fc4cd12330f8b4b2e 0x23ebaae54db96bb7d5010fee4f508c074fa0e217 0xa151bffccd2f580fdcddd412e9cc827fe0182201 0x02b1c7e4b33ecd7456492007bbf7247e89d76b48 0x849774a7bc867b6846b074b45bd1c2585672ea1d 0x852dc7638ad159ec12526d7e47f53f1307756a42