ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-042CCAADDD62
|
Infrastructure Scan
ADDRESS: 0xe1e6fa66eaaa00edfc8ea43eb36aac3c96fa0c08
DEPLOYED: 2026-05-13 01:55:47
LAST_TX: 2026-05-13 02:23:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.81ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0xbd. [TRACE] Debug: 279ff334e61318e3. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 8f7abf31…4efb5dc2.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc94a01ac0e3aa348b6683d2731faadf6ae205f26 0xf3a6425b37cd854fe671e135e44b26716c511492 0x26f1864ed84c5e8b4d76dd94de0b550070f1c9e2 0x9aee73efbc2992ea09dee9e2197a1e7438968a0a 0x9b5ebb4cba03b765d4de60f4fa114042cbb5bae9 0x7f23ebc472c95a041ff86671d93038b7ecf73a13 0x6cb15decb3c8836f18c6fa73a6bf1a46164fa576 0x82484185e66ec6fefb5b5391cdaa26e3e83299d9 0xcd340c0765e616df861ddd4f0eca26af80ff152b 0x0a751b0ee174340a0717b1ecfbd409577cbb3aeb 0xad289ed8d0a1e2ca47c480d69d3cedc1ba64b24f 0x0246687070d924c7585d2c76e12f255dd5464293 0xf67712405c47660d21333b52d6e8b1cbe6b7e547 0x350aad73ddc3918dbdb717ce2c48861040ba4b8e 0xa30b4f2afd96a36f20024d17aff7eac66af2ef05 0xbb81095b7f0d7715ac1f46ac1d7594f15dd81bdc 0x04483be96892ca5959e3b627fe5aba379c04e486 0x2f76176edd38b375346a8091fe470e693a1e7306 0x5beafe09c75ae8e57221b86082c187fd7e011dc9 0x6668f7b57cb89cbef1c2c2ef39edb3a28d492ba6
