ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-035281C0FADA
|
Infrastructure Scan
ADDRESS: 0x610b201cd63fdaa2358ac9c011fe6fe758308a2e
DEPLOYED: 2026-05-11 23:55:47
LAST_TX: 2026-05-12 00:28:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 65ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x742a5314 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8e449e9588928d7173ab2ee0967fe2a3a5038e1f 0x7be82dd00fb99ed927aec88f89cff6f1f9f33817 0xbbb5d5caea8343df1d75dffae3c7d8713dc2a7be 0x307ed41109ea4957f0a3da7249e23315cd1bebfb 0xe48effe99ff9df64618f4dd80508dcb61eb04205 0x6a749cb10e96ba133abf1e4de67c19c8c4b89563 0x0fac981ee0a1caf621205549b6107536dcd896f2 0x92f6b3719fa86d0e48c3e6ca039dc9fc29c79470 0xc44536b9c4dfa736f3b3309a92bad8aff6d08608 0xade9a7a3c0995d30614b08648f5d966e5da24afb 0x9ce6c8106020a13804bca3c94bc6f2dcb1ec6aeb 0x14d65a5fdc4f589770ff4cea821b4986462682cf 0x104397d61961b3d8a9d4b31863549f2e29afabbb 0x32a2dbf09e68c09becaff672824548d84f98fe8b 0xeb939ed3ff0e4d070ebc5895dccc1a68985dd677 0x2e874777b6155424a00020c5965c3a8255b1b770 0x7bad7f2675c7740fb28c40b8d0444368bc640f38 0xd2b28ed45d921327062c5a8c60c2237c6cc02025 0x45ca9f5cc91ff6f49669a6e421a745c6f09f4e04 0xa52e43cb2acb4b89e53d712ec77e450adbd228f0
Leave a comment
You must be logged in to post a comment.