ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5876E4FC8645
|
Infrastructure Scan
ADDRESS: 0xba4c928807450c57e4f5aa18cd507987840847bf
DEPLOYED: 2026-04-20 06:20:23
LAST_TX: 2026-04-25 07:20:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 33 segments of contract data. [SCAN] Identifying function signatures (0xd932bb00). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xe4a503063931543a08d5e3751520598c93c38c4b. [TRACE] Stack trace saved to /logs/TRD-2F40697A.log. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x54c3a36d66deb7f6b55ba2de1769e8da6fac6ccc 0x9552f7cf05b70fcf9696e4b85b244e1c31998d65 0x8fb44c71c1c4996d58ed6685d642eec0b05f62b3 0x71b2bfb1a047d9c17ad46a20994b39431aca569e 0xe94de02e52eaf9f0f6bf7f16e4927fcbc2c09bc7 0x6df4e85bc25f5758b4febfe6178f0710c0fcb4d9 0x057b976113172714827fd4da3bf08fcc73482363 0x7d98346b3b000c55904918e3d9e2fc3f94683b01 0xc992a2d5454e9a9ebd7bbde4ae6078b8dd9981ce 0x6a613d0ef9eb7f02c0c97f1d0e1f47ac128f666c 0x64373245a488e46c3bb71b2350fd422da2243644 0x4a25ba7ce13566ddc4b8d04e69a8dac5bfc6fb97 0x2c0fbcd2007782f68b1de2b841a6d6f3aa5ae32d 0x7f18e8aed0a3786e6c81a92d3c30d196a530256a 0xbcc89da1ee8ccfd1062ad667161f50c86bdeb9e0 0x600747cb1c861b3ca01584167467833a8bb3b1f7 0x7d537a5f4e7d237530437296f44c34c9167215d9 0x20eb40afb5105859c7db57eae341cbf21acb5fd7 0x201ddedba40f6893599517e81cc862352ef0e6d7 0x26ca842c5490b93b88e4e5c7a1617e4299063a5b