الفئة
تاريخ النشر
24/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-65E18BC0BE8C
|
Infrastructure Scan
ADDRESS: 0x747f7c918d65f9acfc5f64b727b7ba14d2a3cbe6
DEPLOYED: 2026-04-22 18:21:35
LAST_TX: 2026-04-24 16:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x175c8cb66afa5bac36306adfe4c9e7c1a7aececb. [TRACE] Stack trace saved to /logs/TRD-30122B9F.log. [VALID] Generating cryptographic proof of scan… [DONE] Scan task 69113970 finished in 97s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf8e6e5d5331611a03aea3f075b7f37103c98acb6 0xf8d762b90bea83dcf04a784e2defe7931f7ef690 0x47de50b3cc4a90d790c00a3e5a6356cbb8de1dd8 0x33d0c5d61da6a7aa2e4db32cfb54f9d52439eb6e 0x2fdcd1e44c54788bb7e59368e77931c2b040841e 0x432dee27185cab8b1ed3f42943cd6be9d8c9e7fb 0x9910f827f8c4a3c13cec99d97a927c8e9261f6f9 0x000bb128a8abcfa05b871c97cc9c5f88e7dcf35a 0x837b80782361e7be1662f57018671146f4c2487f 0xe0cd9d9dbbf2c3f6934348992045d7e051e5fd1e 0x5b5dffe6d2ad97c1b514bfa5fd776fc1d5e6534a 0xc97a29651887360cab249ba67c547166ef6b0fb9 0x026b2b67b5fe4576923d6a787e5a630d5a8f8903 0xb0e388d46409b1adddf8e07546d2510ca7808fd1 0xe39d03f12147e5ad43689b7d36a8501e5140fcdf 0xcbae89ef9feb9e20ab8d303c220f343746bed292 0x9b05e42a65ef8c9592e6a28a3b4a014581490347 0x2f8c355c896fd2cedf85a2bdcf2545a6b2cdfa5b 0x21bdf474a98da81bb4bb5b590c4e173321319d63 0x51ddac6bafc11f724515120e39d03fe5bac2d104
