ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ED87C9E71BDB
|
Infrastructure Scan
ADDRESS: 0x34d5b78d013e2482d29c69187b7604aeb9d8d471
DEPLOYED: 2026-05-10 18:49:11
LAST_TX: 2026-05-10 19:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x34d5b78d013e2482d29c69187b7604aeb9d8d471… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 39f0 -> f363 -> 5f66. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘2A763CCA’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc1a07d073432193a3c3210ec20d14d0ddd4d5994 0xfc94b0d972f8aa53164b64512c4f746083e9666b 0x8960b4a35b214ae3449bdf7831fdc3413be57db7 0xe389336702d1c7a52fa6eb1743313e13e83d40f9 0x59bd0ab6297193d46c7749eeb4d6939b243e3072 0xeb4aa44aee216b91bee2836b1d5a779d31485cdb 0x9860c3242269d336df839afecfef634ce6cf1bb1 0x9177787b6978aa9eb9b858bbad59238790a2c95c 0xf2fe2525d2d7dcefebb82b86156b1784ffaa81af 0x864c6d7f7d9146d73129f10fb7b6355d1c3b6303 0x6b8bc3edade9906c8c043ea0e872ad7a9f80a336 0x9751beb96f76dd06d60e50bfb3161b1361fc4c45 0xd854628dee17aca09e9251538e0871203a283965 0x6835a93d4860ee5c5c0e84c2641f4bf803ff72d1 0x12513197951a193b88fc3767abc03491c3d16791 0x8279cde5116aca09b50cf0e32a9692672fb17a22 0x9e941f886565afe4dee41fef526df2c7a2e46965 0x98e94c5f9477953e6b5d39989af63cc6959d1b36 0x694243a1518d00000a2164f5cb09dc6b844a0c3e 0x756807a683da7c56616f771c431e12772c893076
