ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-22041E35FF8B
|
Infrastructure Scan
ADDRESS: 0x4a406d050f8d7a7414ccbba21e94f4c21f4068c9
DEPLOYED: 2026-05-13 06:14:59
LAST_TX: 2026-05-15 18:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database... 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC... [FETCH] Entry point found at offset 0xf7f9. [SCAN] Searching for 'DELEGATECALL' and 'SELFDESTRUCT' patterns. [MEM] Snapshotting EVM state before execution... [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for 'transferFrom' method... [TRACE] Debug: 3e9626135336bb69. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x625d36bd7bceea902f14a0808af1f04608fa7a54 0x81f0c2ecb692fff7df391d231240aa38fc1f6f2b 0x4d5a6c4e78ee4c055e9512a17039d84cf0cb271a 0x52e323101d7b4c02f4a367f78b0aa57188c2e9e7 0x9edfcffef078891f676166c00341efd06b8e6664 0x0c6a086d1533c03061cc9a24484c1673500dcd62 0xc9c76b2acfa078aa6837a4b4ef2351d73333b135 0xfe9714d5f31bee635ae508a5c4ebfcba11dd561c 0xebd65e99cc0609a0a776bce7fe871c9675717c93 0x2573af84b78974147217f8e56bb75e00907a7441 0xd73182c6360777692af79b6197989ac5a900abea 0x8590ca140a508226a3f10f38264cacab39283f1b 0x577bb27afa35e6c2af52cfc12d38b7a19c374af4 0xa74bbe995f73f900c7ba1e678c8f2ed1022613a6 0xe2d521004ebc028762b33d491b4f3a65051bb253 0x7d5a3502b600db580a8d2aecb7677259e14260f7 0x0245391ae2a64aa243990bfcca8f025132d2edcc 0xd291e95c4cb270d4ebaa225d2e1797e10ab87c21 0xc1fb55f45329fab2507e1d1403873d12254c881d 0xc6ba106eb622716043161f1c4b602beaf7b2c109
Published by p2g in Uncategorized
No Comments.