ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F7C318F17B3B
|
Infrastructure Scan
ADDRESS: 0x53fdca91fd33b9131b5ceade42a3edbd9b38edff
DEPLOYED: 2026-05-05 23:13:23
LAST_TX: 2026-05-06 00:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Synchronizing with block height 85767. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 2 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x77aecf53a97ec84b0624c526e9a0ec53510cecae. [TRACE] Stack trace saved to /logs/TRD-747E8CF5.log. [VALID] Gas optimization score: 16/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x01e5d9b6db77faa52fc4db1299a0163e5daf5f82 0x4a8027d0d68f23f18b5a2601380cf4d52a74c57e 0x22853cb7036813d40f24ea3a66762abe5a36b225 0x1f512eace5e2e59e34ca7a0d838b14daf6592de8 0xe600de50f9e85914609af37059e9b5feb3c37895 0x9ba9e62b91bdfb95e7fd218a5eb8cbeafc72c063 0x9ce9d7c9e1a3f97dcfb511334421914c78798a8f 0xd3a34f0416c455420b00b828e8f2c35944f6a6f5 0x14345b7f1c859918e46a767ed1eaa74cf89b7982 0x246203fa76400a52f874e2dd1f41ddd3b49f60b3 0x1992f74f068c032dfbb072f4d9a415f6ce5a3511 0xdfa56395a61814071d82418f22a530e7eaa7c09b 0x278f42168a07f7a2d01f12d952d2c2f45597713d 0xd8e8c72afec564ee5bc88a6a713c54449fc56469 0xe005601766584825ad32165adb99488aa2606c00 0xf6f2ebd4bf0e77ae8e2acec4e03acec26de1a259 0x1c86e0b33f9d6ee38a5a543407d7443ba3a91df6 0x59d3627366a8d1b1519ef7b8bfd33b656e9465e8 0xe06bf91056457a44ccae007c9653d95d8b10a73c 0x0a5d4bd35468d6475d456673bc85f07331662bed
