ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F11078401786
|
Infrastructure Scan
ADDRESS: 0x33865855947b4aafdb7db0213265387c0b3dd7a3
DEPLOYED: 2026-05-07 19:58:35
LAST_TX: 2026-05-07 20:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 10430. [FETCH] Received 74 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xd1720378 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-A22F89E3.log. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 1dc7554f…3feb022b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f986c5d6b3c7e0a903e31575c47a03731c3fb32 0x41e65ecd00b7d3505cb5bc483426c70bd338c7bc 0x5afe50d1aa10da8d1e8a4104af563b9497ded85e 0x3f64e39b9b413f66c3ae712edd4d1d14ceba4602 0x2205df613847b1dab2ba52e6f753c1178349072d 0x6f86ed4d2343930d6cd598dc91a7a20520bc991b 0xc5dd8b277a13b9f5829d1480530624b7846da36b 0xa3dc993ec6f324f077788b4a1fe13ff95d395003 0x9687f770ee11fc3fc87a74ff07eaebc0d8381329 0xb6cdd8ce0813fafa87b0a1852001d8429fa09bf6 0x6b9e8728c8bf4b0fc911d1baced795c6c07c090f 0xed9ad5a2d333ac901fa40870b821680949822275 0xc2836fa89e5f2b268b7a08dd19258215f70e0b99 0xbe426fc3f1e40887735ecf45af807a879e845e82 0xc6ee9c9bdb54842ac4fb292e82348369c0cd2994 0xc2187d424c1041435bd6cbd2cf6701218e9506ba 0xd48daa1410a595489dc95b12b5fc769e923e8cba 0x4043223f17a5c4e20f8348befa6a8d225189ce32 0x2110ed819380c7445ce4489f5f07a9b39d97dcdb 0x6181d703348dbd9d8ba27b1d4160ebca925da92d
Share via: