ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-77DC8B3FE750
Infrastructure Scan ADDRESS: 0x3798c465efa3b2b8eff582d2d20ece040e897aa7 DEPLOYED: 2026-05-10 21:56:59 LAST_TX: 2026-05-10 22:13:47 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x3798c465efa3b2b8eff582d2d20ece040e897aa7… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x79c43fea). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Balance check: 3.23 ETH. [TRACE] Execution path: 87% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 11f94434…1dbc4774. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd69b1ff2164d801df51e3c951a4f47471b98d278 0x0565abe13b4478a2aaec7ce7991ef16857f159fc 0xd8010e9f93fea18a7f2042014edef820e46d7a4c 0x46aa52b6cc3d9b32e2baf26fa5972eaccf57173a 0x63a62941cce0e4dcbba580202a2a2d3b66be43b4 0x3dd5d96d94a46909944b32c239b90287bbe6a4bb 0x65f359cffdd764178f83417b66458bef74368843 0x3266b87cbed0918dc0bc05149d0746137a4e2ccb 0xe95f0f0380399660b55389f5742b84e382526b44 0x7716f17f0d229373427dc46b28afbaa8d1c77cb5 0x6d7ba4ac96fbddf84ff1290b59d7811e3af3bf20 0x78d5fa68f6041e426c3f5b933cb33060831714cd 0x1f83b7e56890c17099b699ea79cfe0630da301f4 0x4f07981db60fb5f025b55b8feb6742533dd9ee71 0x22630d072a68a06a4e9a6b4363c9e634cfb13fa2 0xd5c8c8de48e2480ad6a6442a943ba95d19afbfdc 0xd1c75306e15a9d441026ca559c6bd51e769639c9 0x2d2dec14bba861ca51a6f3321e839f4da0d34c1f 0x7f7ed3ebcb35dcf148041edb333fc94dc60688de 0xab4fd44eb33ddf35e9e5e40fb6e77b1203e6953d
Rate this post




