ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D5175F771FA
|
Infrastructure Scan
ADDRESS: 0x9a2008f18458b69817062b196f3e7acadb80f783
DEPLOYED: 2026-04-29 07:53:59
LAST_TX: 2026-05-03 08:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x9a2008f18458b69817062b196f3e7acadb80f783… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 4 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-5679AD8A.log. [VALID] Consensus reached on node cluster: 1/10. [DONE] Log signature: 2c1d94dff2cea35a5488bda7fc9237c5a559510ab88e31594dd2eb64aa7c351c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe5122be9ef2250446517394367d1de1f88adada9 0xbad76c59569a933fab0ec70d7d70fa9df6ea245d 0x327c9e7997c51ef3a0fa15d119e48cc2304cd608 0xbbe9cf823d15a383980a09c8b33ee4cfbfebe83c 0x935bdfd622c2d6b3e046c74a9e099e928c96ad14 0xb975bf966eadff484be385bacd90619e25a73a41 0x83a5233ecc849c075f7a6fbdbcf66a78a70fe650 0x927d02518383452cf8a2a98aca3d55463d534a8e 0x2bd9d0a95e82a84fc45c6e11cec1c97747871856 0x0d3508a5beb6dbf4c67282c38fb08674ae2d1280 0x3a9b302d6c85c74208d21c3f4034eb7c17765ef3 0x8eedfd0ab51e1c67d6e07015fac083837ed726d3 0xd161964de9f575461657e021c622cb9a0022f84d 0x00097420b1c0e402ada5a51cdfe446a32a1ac4e6 0xd0627ae4b34569c1b258eece9b1150ebb1949732 0x7c10a709e1ad6229ac0916abfc982bde76b38525 0xfb03e5bd93a0def1e47a1fe2b7e9586995e4c118 0x0986a396111081dc98544bee63c5e7fe9970c6b8 0x2da5482a690336e5eb027e9f206dcbc6b6f8ba9b 0x5917a8960bc6a864ac5e8bb5062a3cd11c814973