ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-08AFC6930015
|
Infrastructure Scan
ADDRESS: 0x102e95db9756d8cc395acd5361f6f80c2a149c57
DEPLOYED: 2026-04-28 16:58:23
LAST_TX: 2026-04-28 17:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 52E125AD. [NET] Connection established. Peer count: 42. [FETCH] Entry point found at offset 0xc6e7. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x7f81cc577ab581aa0a7a9299f97d5bded337c5e9. [TRACE] Stack trace saved to /logs/TRD-811C50CC.log. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2c70f2c18f698c5d24f16680ab083d12a8dd246f 0xf2da033e5a3acbc76076984caddc70c6f6b1a955 0xc4e82355c9d50f73766617f687c6390e83773ca1 0x488e26d4d76f613283c7a7d90d0f429757d4a9da 0x5e2bc45b152fd3f14610ed0c767dd5e726be1996 0x5e8c83b4d9f2c251566451af881613b279110c5a 0x7ff3cbce0b381014866d93cafe814796dc955346 0x0c4800272a43298964a555770d58aef5c13af2f8 0x7c8400cc5dbb7ad57f79bc3e3f1f92b19a0a586d 0x9552f7cf05b70fcf9696e4b85b244e1c31998d65 0x5b5dffe6d2ad97c1b514bfa5fd776fc1d5e6534a 0xb3c7d7c579466da365b0b4020c3afaf0bc2e9735 0x3b557d169adc3c440f114fd9cc3591d83162a044 0xf56952dfd1b6cb8bc4b597fa1c427a1c501450ac 0x6eb2fad82c31358a7389b9d2d1a04e42bed7061f 0x86d4d99eed9f0b7a04261b6554e79cdc1ef20e5a 0x08f5d3a621d2dac9da87ab2dca00f1fb0229a386 0x6d22904806e90fd5c9a019b2c29ae1e2a7b536f7 0x8563dbf89e6b02ad79af1b68d7504b92fe25079b 0x6f0c7270007ea4300c600c457cde94b1194f6a55