ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-786BFAB68B37
|
Infrastructure Scan
ADDRESS: 0x9ed578831ddf3246731ef74e992163631cd010b0
DEPLOYED: 2026-05-07 16:58:11
LAST_TX: 2026-05-07 21:05:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-0A4E4CEE.log. [VALID] Gas optimization score: 79/100. [DONE] Scan task DFF3889B finished in 36s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f89b2e9e872da931de8143831bda83a472b0aef 0x1482c129d144825ceb28a9cedfcd7b6b8a4914fc 0x979353a08cb20e9a04975a336790a710a85c9d24 0xa91cf005d4cef3ffd44602e2a39491d656c41b6e 0x9441089e3652cf3fb50e4efea561051982d16cc5 0xbd320ed93cc82be6fa19d6c28918fdb59c1fb367 0x288554e9dc61187eab4ea1635609262174ab96cd 0x064edbaf92f6616e6d43b8604a886ba3f5e9c748 0x8fe42cf8ea7fd8ab4868177a69b0c978935cef00 0x3fe2af1df2191bc40b0f415cc74af60f6d18e07b 0x3448e3d3b5999e33ed830cc13ee4e5d2e9ca63ee 0xb58124cf4214d051cb95efb0169d62fbd99a5613 0x5d654f9801432a464d1675cb5d6d39745da8f089 0x6952a4ec3c895922cb5d01b0efd6ac914acf9da3 0x2b2fc6ceea8399795d95e85fee45b6bf62331900 0x477f9e6c5c20af30285474a36df39812d3cf3721 0x98d17ded94d3edb6f3dbbb2a141904d58dcfb565 0xa41d1f150b920afc9d36c4e069f1cf71aec193f7 0xaf1b974399de6085575778175112360f257efcc8 0x98c133c85283c2042d2d8c804482b523a30397b5
