ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7F338D103020
|
Infrastructure Scan
ADDRESS: 0xd4e43c86334940a246daae8908c9b3cfb97c6817
DEPLOYED: 2026-05-03 03:18:59
LAST_TX: 2026-05-03 06:00:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xd4e43c86334940a246daae8908c9b3cfb97c6817… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Gas used: 19190 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 622a7b6eef412bf0f520e6dfd727b2453acdc477e19eb50c1c938d2f6651189b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f20f03da956408bee6108ee839bf320dd59281c 0x0ee6a630716633b0a65bbb396588984b1ad43662 0xe4eb0a0a23582420320ab2031b8c47009d2917ec 0xb934ff15bb194f6487d8e6fc6fefd1de1a0047e1 0x82921efe632ea06f57d2e5cb156c90c8865ddcf9 0xc20acdec3f059932f6fc0fd2519284fc8a498e03 0x1b02ee7a57c81826ebc7586b388c8010cf905c40 0xbd5ac898b2f59a7dfa63040d0483a2d092666970 0x9efcd3ae461a4f5769365b25673053fb08cc76b9 0x302b885e46d6eedcb97c9912ac2bc2e54d891b3c 0x53be2e17d1091672e6a4d08d738279ee181bc0c8 0x44a335e110be41625e093dd9207efbbcdef1c440 0x264988116bf2812815c6904fc9225440269ed479 0x360f3dee508482ceae980e49d62453f9715b33ae 0x1a30451747aa07c109974a19844abc5ac9e1c63f 0x98bbf933201ac86eaa9a554413b827b77ccd226d 0x2f8868b581d9df685fe80be0be2211319a80fc39 0xbc3116c66223036284c027716aff6861e1b87726 0xe83a5c824add68255ccfffb53987f4c3201cb1d1 0x28d33805b645d8759e896693b36e5c02a69c00b8