ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A79668BD1C55
|
Infrastructure Scan
ADDRESS: 0x1fab0768d6349555e48c895ec644c9dfa3ad5397
DEPLOYED: 2026-05-13 21:49:59
LAST_TX: 2026-05-13 22:44:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x1fab0768d6349555e48c895ec644c9dfa3ad5397… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x4991. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb6d92dee8e625149793592f3fd7cb6f3831c017 0x41f504b0acc085f0ad28c4a7093dbf9fd9ebe741 0xc620bab06bd8f0110fca661d46626b887d2e38a2 0xb5851358957ad3b0ac5e1f2d552b1073130cf4e8 0xca1f0840a89c869e6eba2031e4400f8251b4606f 0xdc0fe62efec3d255fba7bf5994b6848c6917163f 0xf0bdeef4e1426a99979881a77b3881aedb9f1f84 0xe06769d79ba0c62051f135d2c368e5ea8a196f1d 0x0c6d2a9c53b655ef63709f7354652508719aeae0 0x95c09ea6fa69dfea73b2c6b5071b57625072162f 0xa95fb528d46a1346490cdbd16c8abdba2ff73f2f 0xc46d0774f0f94c9406c5b68cbaa8916428c531cb 0x3e8c91543657f3214f26a98ea17b114b66c1a7d7 0x6630fe5242f4aacb73125836c2d3e8d68c0d80fe 0x0ee3afd11c6a6cd9de3149a0a04cbe65edce761f 0x7340a2dbf6a60ec3bb3d94f8a321313f27c884c5 0x271c92ac536be07ba2e29b516096aea802e9fa15 0x25412f64a224db1ffb4f7aa5480a84632be41281 0x11ede18e53392bdd7d3326605ed1e53b9f49d6b3 0xe2b172b861fbeb80f340ff98702e01f21bd3afe3















