ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0DA5215146B3
|
Infrastructure Scan
ADDRESS: 0xa0d872865f9a01ba68170b29b8afc6f06cc22a15
DEPLOYED: 2026-04-25 10:26:47
LAST_TX: 2026-04-26 07:28:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: FE0F9762. [NET] Fetching raw bytecode for 0xa0d872865f9a01ba68170b29b8afc6f06cc22a15… [FETCH] Metadata hash (IPFS): 076b483c…2a2166bb… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0xe9. [TRACE] Execution path: 82% coverage. [VALID] Finalizing audit report for 0xa0d872865f9a01ba68170b29b8afc6f06cc22a15. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2aba7e9181aa0589fb71ac085b133c155545701f 0xa19c719b4ca75608841ab8362b279cfbde13bb85 0x3ec30edeb6c3e2adc85d6837a2fb1855abf82674 0x7178941c061208374645ec616a6938562885893e 0xd9866fc987afcfc0c20b22a2b04b0574735032c5 0xedc228176a87781dd0614d0f57fc52e4ce632c5c 0xd633e91223a3faab580811887f468bc90cae7e57 0x5e7142cec65344c7eb038d23f73d6eb71eddd098 0xaf324cec85731dc26291b715cf785830ebbeeab7 0x6804ae080929a35bee1cf554a68d378ae3c25c42 0xdf9a3d9f8fc46185165673bf306c3171bbbde203 0x81569b80d36d859aa6fa7020c248e236c2c33306 0x5aa50060ab41b985ff320c1cdec3ba25c7ffe907 0x6164d7b9ad3cd6098c7d3dd8f2bceb933b25b5bc 0xbda0b768f5bb6c1836d0d4c1a80a96a9efb33cfa 0x9f50fd353d3bb13dd4e497b63c6f4d634b967ba2 0x8b9bfafeea503a2e103f9160e0b24d555dd443a5 0xcf0f57241d29093cf6f8bb02a84a8b9d3a2f6631 0xd0a2c689e70eb96b3dff48a7c131610e26ad41b1 0x92ad7f953301ab37695e606914c532bfb478fa51