ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B4FEF2281D26
|
Infrastructure Scan
ADDRESS: 0x5bdd8d223ea4a202d625fac9ef0b2de91d6792e0
DEPLOYED: 2026-05-17 11:25:47
LAST_TX: 2026-05-17 16:50:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x5bdd8d223ea4a202d625fac9ef0b2de91d6792e0… [FETCH] Hex dump completed. Entropy: 1.23 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x210f. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 13 iterations. [TRACE] Debug: b46e99600ca0850e. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1ba5082222eba8f3430694d5d530520bf3dfc1c4 0xfcb591f70845057ca029f9ced2d6c01caf4e2cf5 0x7424f6723c80851a49981125b5cb7f9139eff079 0x202881934a033914a28019eaf6a3bec9d26ad38f 0x551b9c71cc1bbcbc483c91c54f1448913661983c 0x5f44444ed6518a74a1f76dc9b4efe6113a0f2c98 0xe98770c5519d1723f45e124d2f115532ea2a88e2 0xb24213319652326c948eccadf5a9ce30a8be1c76 0xaa1938d93bd347236c66a9fefb6fea66d1cfb35b 0x655456c1b31393c85d45c873a6157a8d1dd2abdf 0x89f86f60425742f91b36178c121842afb7b03bfd 0xad8f115e8543c6b2eb1f0933c1d2bf08c6d11b40 0xa39b793abbe5522c35913b33e844540760f71984 0xa1abaf38cbcd6b5b0c33b563df051d02f5efabce 0x4354e55a445c980866a6c8a86a6850892b075964 0x00a7aa1a3cde1a1a04b75158934f9472c5c6a4d1 0xfbce00fa832c2e5e03da051a6be1d0e4c2aa3304 0x31ee0195babae4ac360c6722716792747a0032fd 0xedd4dab3f0c55a0806ee538feb5f512c5158b9db 0x310f16448f65c53de6fa9c9e742dc4f3dc91b116
