ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8BDD93F5E4E
|
Infrastructure Scan
ADDRESS: 0xc557a8d8a19675aebdd1d0b4d7e373216ab117bd
DEPLOYED: 2026-04-24 19:22:59
LAST_TX: 2026-04-24 20:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x8e55. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 42% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘156AD5CF’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xca82120d15ae75711c3b813877fd38db26c01dbb 0x86e719aa2db36b16ff736476b7751adfbb92b74d 0x5a293cf5925c073074318949c0b457e395a43981 0xdd71d390fa6087d7ae3d2ae3ac9e5a6bc2e1e570 0x4efb357a5fefa3d53825be35410886c62b057dff 0x94e03ec9611ab4335a7b8920a0ff8868738d44d2 0x0b1caf4a825cd9edb270857d1aa3de7bd409ec39 0xa1e5386801e8ceb100a923b8364a57a63623cb61 0xf778b5dd4f9e7711e12833bbc8126772719dd0e9 0x6cc9ae19a42f453da04e729cf7f91946bee236da 0x6e47c725683392832357ee1b71c7993c04071d49 0xb934a672d540d2b562f82a8e23d3b102e1ea47b2 0xec7219eb20dc2d6ac7782ee3220fed535dee15b5 0x024a4d8e7b2b2348ccf5023c1f1ad947883d5191 0xfee3eb2ae460e0f71d0bde23ae96e6d0129525d1 0xd9de5a708185a414430eda010a3e405c828ae49e 0x0adc1ba52d525931162fa29b9577cc594afc1dd4 0x4dfceddc0f4d1881b01d3df9a071c92ad22088ae 0xa14fc912b6c12a2db3e121f07c77a0b15279c8c4 0xaebad8d71f121ed4f0cd7ab93acb91e7f13ef3eb
