ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-92E2741B8A0C
|
Infrastructure Scan
ADDRESS: 0xc8b17134ec36db80182d2260115e0216a60cc557
DEPLOYED: 2026-05-13 21:38:23
LAST_TX: 2026-05-13 23:00:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.75. [MEM] Tracking pointer 0xea92b478 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x12 analysed. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd5589a726f29b417ad1af9be240c80bc35f293d7 0x0bb7311d4cfc305db7bf2838a69ae081a693524e 0x93ad99d5589251d9cad24095ab09db9b6e01f2df 0xc4e203dd5c29d3725ba8ffefc939c0274eab5025 0xbb721c54896bd34ad39d8b6f5e5d5da88ca4111f 0x68922b889a92dfa81a63bc5d30d41d17c6665db7 0x4bca7f50896398037db971cdadcacdd5371ccbd6 0xdaef5090bdf96c32c64d5fee4be9ec9547bebf79 0x963d7412982d3266a5b39809941ed630add6ee50 0xe91e8184c411f84853cf781f672c73e4e780557e 0x7ec9e567f4b4f4dcad7291c539812e625948e7b4 0xdd8e171923626ce61799d89b8013d878bbd2cedc 0xc3828bbdffdac551f07ebbb1497c168b2fa9932a 0x07e249e6039d4a4fc68b3f308181d98bffccfa0d 0x5db1c01035d1acfadfbbe7caf4d97f95c1adb3a4 0x212697f0a9fc218210d98cd1a159dc8d8a87b8a8 0x56a479361c96d5cdae674c0f032872a87c0b82fd 0xb861c94a09afd80875b4c8d25beef4e8e8f3bff4 0x840481cc4926fc649d1808da834b3a50627a4061 0xd1d1062d447c50e95a30a0140c36eab5e0da40d3