ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FDBF72960396
|
Infrastructure Scan
ADDRESS: 0x05a7599bdbb5024fe82f265510dde032de86bd41
DEPLOYED: 2026-04-27 15:12:23
LAST_TX: 2026-04-28 11:42:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 27. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 1628… [TRACE] Bytecode segment 0xdd analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x9de7d571f9e6df593816dc992e92efaa01e19e20’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbdbea55bcc9ff0533d749c1da9d369e71432f186 0xf91fb7ca39c80d9d2586ee042f2449167ce4395f 0x113b762df0ccb8bf454c36866dc82dfd02843c5b 0x0b95da60400499f32c3ab95d8c78edfe5c7e281c 0x5e2d13bab15c35d5e4ff8f0f3c10351f5bf10878 0xc821ecf5b535ae05e707fbff7bf0fa8f96183bb6 0x8333cf74eb3d06d6b8ca21def23e48e0652e162b 0x257fc647f141672f52ae8b2f1b9afd58df3f2c6f 0xde6ae76aa74f5b72f9495ec1a112648d54792bc9 0x7f7a717550e5c99f41dc6998837bebcf5258c604 0x9e3869160a0e21d7d2c8d337222f4f022d87a245 0x6a24f7850d9d15f1d32cb1d9cffe117484660bde 0x59339f38f8a93ad5889525a09b01bc64305bd8db 0x036e1b7c8225c4b63b59ce2159fe799fc6d9b11f 0xa763bd36e9b74497864f79b17bef5e3947afa808 0xff91b0d3eb7a0e1f7bf578324dd22fc8005c07ac 0x0d37ef1a925d895622875c2e21f9600d66b20f77 0xf9441fac0dbaae55c20c13283230b6b46c5b272c 0x0b05e4a3f4a3788c75979beddd2127054121fee3 0xc92b046f7755dbb4ed64a7dc17f6cfe29791d3f0
