ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A3E45032AA21
Infrastructure Scan ADDRESS: 0x9ed578831ddf3246731ef74e992163631cd010b0 DEPLOYED: 2026-05-07 16:58:11 LAST_TX: 2026-05-07 20:47:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 10 segments of contract data. [SCAN] Analyzing visibility: 6 public, 4 private methods. [MEM] Initializing storage slot tracker… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xe987679d480d0406ed2f2a99287f412ac183ba6e. [TRACE] Stack trace saved to /logs/TRD-26861FE0.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5c795436be3df0e0e40f0a6f8cbe997f334aaac7 0x490b1e59870bb0c17ea7c994a65afc955e6bfb49 0x92be3fd7a7b7d436d9a3677a6fe849a1d34ceafc 0xda69e583bdce680b5376c9c795faef91bd636b9b 0x8840afba4057135218c42a26303cf503de213f88 0x7852e7b6c8517dbefdb321c8b5619b1eae7c6f55 0xfb6d0ea6c68760877a8d0f6296bb7fcb6d5e7656 0x1d946a8eaadd7210bc91d2e9be841dd7867d18e3 0x3436cf21128b3f94c7b06e14f064baf9654eb7c6 0x7a4610143452366a3f736445727e9a6e63d78abc 0x397b63a90544c17fc99e0a3280fa7d5a660e7319 0x6003db06bf202f76995b585aa83c16b6ea131cb6 0x7822d73f6e2b54cca620fa7cf431a04dec8ae784 0x913313d0939cd631791104c1032b149b13bfa5e2 0x245f8ec0fbaada530cd8aa6ed5e46b07f4ad3fac 0xb876a03665e8b7d286e0cf4233270ab0d80cf2ad 0xb87c5a2212e91c2caedcd4b94e7f643f3a3fed48 0x11cb2a2df68b3b975936d54ede43945c673a62d9 0x4cbcb392adc7cf0a7a5717cf6b2593059fa53b9c 0x060610bb80c2d4b271041a8c36b8dd2500ea7e26