ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82AB7D89978D
|
Infrastructure Scan
ADDRESS: 0x3bb2c3b044329506d45f0258325d59c557afeee0
DEPLOYED: 2026-04-28 17:37:35
LAST_TX: 2026-04-28 18:36:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 46. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 9263. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘2C9CC9A8’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6d56d24139365d35f84b216fbcfdca6f8031b5a6 0xa8e6ea859fb7126192a3dff611e33a919036eee0 0x716e014f7e18d2e3e3ee45510b3975ba5a100940 0x3a36d4a7b7ba94fab911918414d50e54ee199788 0x74f6131d10953f99f9a06c50ce795cedc35459ba 0x272457ce4658c73745a80bbe176820e21495bf0e 0xca30cd52f1f49eb88392d5734f007aface13e312 0x02173a3962133a1a49f4a1a056c2afb5e8c99ddd 0x9867e4942a1d460c9762bf72fefcbca1964f4388 0x3cb78b76836f612b45d98e0534d515800e0ef9e8 0x8f573eaf6000e2fdf7f0c0e190e373158b7219ec 0x83650c0ea613c40b333fb8264bf9f48b8b979831 0x15ad321e15b7f5d62685fa8d356f75c2a08943c9 0x0adceb882eff11a7ae3357a19225af6e0c8a639e 0x5ac4d62677fc232ea11cedfdd6dfb737f7aa86b8 0x60df35420a20c28135ff2fa5a68fc506d91fa6b8 0x9ae014c782edaab4d9f51b08de678107dcda6514 0x073aac7e4f402d8dba2df3260070c4791e498089 0x249dedfbf5a4a296e0ee834f303e817ed3c12378 0xd643fbdeaa8ed2642eebaa9e56fd417c68b23fd6