ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-27727A46D892
|
Infrastructure Scan
ADDRESS: 0x23cd5c5730ee8bcbc822fb4e9013f7c86c593118
DEPLOYED: 2026-05-12 06:10:23
LAST_TX: 2026-05-17 20:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-246786D7.log. [VALID] No critical memory leaks during simulation. $line = str_replace(’90ff6fcb…df7f4700′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc2ff62af11d44f769fa11b6cd46f8c3992c1329d 0xa187f2c918a87ff49515fbc72fb5b6d8091ecfa4 0xd8db8659d8bc2e94cabdaf574beb7e7816938f21 0xfb6e45bab2a8aa811d487f34ac30ab62050f4f79 0xa36eecc6ae7ba22e6f14cadaa1141514abba21cf 0x7215aeb59d8a8a86afd56423a716e6bd872e7906 0x1f92800bbb2c47890ef327b86649e9a5143ab795 0x85a7e0c2609347d64d37cd282c21369697bf16b2 0x9929d6aede9437106eaff15599bcf021c3d66994 0x87775c0348052974747243f0dd5336faa79bca05 0xd231bfab03984ba3bd1b8b2044e32e8a28c41a48 0xc5ca371c5f715e9d420941c1377e7682780bfc6d 0x58483f1fddfb44099f5a38254f2602aeef389adf 0x2e864f8dc6f9060f889256ab0d51f13367c51878 0xf3fef441f256868457805563d21d96ce4cf8678c 0x54a7f77ffa0de26cf1ca0cf1b61ec8a184b1c8c6 0x9c5a6677d76db19ba8707f17014b6520ce8c8f66 0x876132595df619cad6b8d8b3c3cff70108cf7e77 0x05fcfe014614bf3702739db3ace6e7c21236b87b 0xe981253c62f1073c467070251925706b58a459f4