ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A1BD3432B1B1
|
Infrastructure Scan
ADDRESS: 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a
DEPLOYED: 2026-05-02 10:32:11
LAST_TX: 2026-05-02 10:51:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x3131. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: cee1bbbf759e0f63. [VALID] Finalizing audit report for 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xff91b0d3eb7a0e1f7bf578324dd22fc8005c07ac 0xd7021a5cb6f620c6c97c84d6e615ffc6b389992d 0x7d7fe68217b5053764d6e5ed5816fd5f97110af1 0x651831c08e514ed23d424099e4943c8a4cd97e70 0xf1e0a48e3272ce17dc1cd59168851603c4f37fac 0x29ab51cf3e00f63e1487c97585d6e28d7c64ca89 0xf3c425fcf069bc90607976a4401f380af5e91597 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0xc07f940c6ce1e8f0634d1e28a1e40d7826d50965 0xd55811b0910f565d32fc2628cdc7535ee1e98f9e 0x160b713037880a41f059680153d595c801f881ba 0x89442d02dbdaf26ca7c3a35c2f23ea693afae030 0xcbd1ff4c3e5dd035cd1b2f11b2573e80bfcd4836 0x480496dab9252ed779ed8ff0f83d0a84b302feb8 0x4bd8fa5a3be72e03c5deff46192b022e610e9b36 0x821f83b37499cb7d96512a9051918115089ecf36 0xaed3610872ce43dc7ef26003c851dcc23a654f26 0x278f1e66e7c553c0f18bbb6945edba5ad53f9d1e 0xcb0f61c691e9de53764f8dae42e861a29f93cff0 0x9210e2dd33b019f6ad32b316f4f0374872bc8a54
![]()
