ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B129B846AF93
|
Infrastructure Scan
ADDRESS: 0xe828b76b0ab243b3a13baedb6c53a9192fbfbcdc
DEPLOYED: 2026-04-24 08:51:35
LAST_TX: 2026-04-25 14:43:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 49 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 5 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘B0F5DC6A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x651b101f72f82630cf59c68e6ee4305afbd3b1f5 0x00369bfc3ceb66b13112fc2e147decb8a015ec54 0x4cbbf1c08a7eb038841204bda5517e64ceef5911 0x78e0717b674cdaf8fc488365316bc8dc9b0b9304 0x27e13f429478b504753119b18d1da96e916486ac 0xc1b6a630ae2252eac7b0b8c7f4a174b4d7f51023 0x92a6045f504a65e8d1b753c600bb8b0cfed20ed2 0x1efa2f8ac0e74654263956b652a23c79544664cc 0x027f5eed8c0f8b9d8e68f60dc437175af7b52ff9 0x907308e92d1013c9814e6c9a0046ccca5cebdb87 0x8a0c80c94002230a6955111f4fb3e5d680357dd7 0x7dbd20a660a37de90dce25e3286f2a341efc6f8a 0xc9631e5c24f3dcefa4f9477ea1f058de312a4d2e 0x72ab856d5b4f3a8ba0a4307389c522254272a6fc 0x218ad1cc1abf223afa44246151cb3c172ed871f8 0xbd9f766b4ebc47210355a6eeaeb003fd99a4fe37 0x1d7d0ba3ab90b5d46cbfe10c3252b59bdc1049b6 0x69d57b9d705ead73a5d2f2476c30c55bd755cc2f 0xc65fb76f9ad82add20f4283ea512474fe9459bef 0xb3f8c6d7d83da78828d561d5b26c1a1ca09ff257
