ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-867105A300F2
|
Infrastructure Scan
ADDRESS: 0xa2f5ee8d6e6c273d03feb7c327431d6d3227e1c8
DEPLOYED: 2026-05-11 09:58:47
LAST_TX: 2026-05-11 10:56:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 33. [FETCH] Hex dump completed. Entropy: 7.25 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 65 iterations. [TRACE] Return data: 0x37a0c324… [VALID] Finalizing audit report for 0xa2f5ee8d6e6c273d03feb7c327431d6d3227e1c8. $line = str_replace(‘0x144f739258349ead0eca57a5df89bf1c05548573’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8536281d3372525a9d8e073faee882ede6553b16 0xf0d5c8e61079e8342d742a6648ee5aa53ed11285 0xc1123a410301abab6690d70e50596683cbb3bd57 0x3ad99b7d83bd9e3969b692bd3df32c915df0fe77 0xc2a3abfabed18e16a0caab4ccb4d3ecb30cd7302 0x57dc984127df2a9ea4c7bc5c2e40102097881295 0x43e2c051ac6c0fbc0626efa6c40a425ec04fa390 0xd6bb091bb8d38ec3ed11879d06e14107bba9245a 0x586303d7e44e658ddcba1e6cbb47ffdf1140a13e 0x719ca0c51c45e12f5e6b15efdf4e2db14aa56ec7 0x39162e7a90822ea27e160e3e78a1cfcce4087f9c 0x6179e8ceb679dde5a19634c1d2a715cf66ab9ab1 0xdde6587ede9d3a507823018981498f7b192df7fb 0x5f756ce77bf9c1e1c64ade86350fdf790a4e802d 0x90b44a9d21a903274ea754c1f03bee3218f28b65 0x4e5698c6851979053ebc965407aad98d58345526 0x34f3e511fa058b83f6ba03c6dbd2c78d607856a0 0xd61afabbd876af46d9f0ce0b7802f2134f95da07 0x456b5266394cf558bfb346b8ab3e0031a3f2a3b3 0x9914f33bb9ae5de018c0c2ca5d5f5047b3fc5210








