ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C0B495B3FC2C
|
Infrastructure Scan
ADDRESS: 0x7e0b2d223fd53903b33dbf1e6b68fa2a0d42b098
DEPLOYED: 2026-05-01 05:32:59
LAST_TX: 2026-05-06 16:30:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 46453. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf779a8b79404dbe09b6c11c84f0e00548792b79 0x0b7a5027d65f654848918e622d030acea11a3e54 0x41c3f91b41343ac27aa16382ce0109a8a77aac7f 0x7880287a177e060b7024c730833090a8670b2107 0xa704f04d5443331154061938b5055ac515ca9bde 0xf87e4b1a8e2baff1fcab89de0b32ec3438ae2320 0xc0ab80eb5d7eca2615e6cffd0dd5c80a311c9b17 0xae180d3580b1c4c5020fcb8b1b2c633b2bf8d54a 0xd4c6841d1f8a2a677ceba36d24d67408bd2a1cd7 0x9d00d050d8d7db2b52e7ee5d68d8d9a584aa7e58 0x6e33614ae4ea1216f7655854ab59d90ca4b4cfe1 0xd6cf419e5ec5816b903643bc3e8a88033e7d7003 0x3527cefd2b98a640f7dfb97e37fc74e8b73ef7de 0x09f245015bab40d53684df33288eda0793059b2f 0x89037e83d73ffb68b41691064c8a07ec2edca402 0x82e9fed757b7a016814725e803016a4484554169 0x9765c401ff2615732a9e9ecc3d779309073c18bf 0x375ea756418fe30eea21e1189104974c185abb48 0xcb07a09eaf4abb4605a28bba6044a4b6a2775e87 0x9f0a7362f2b6fa1be89b79d7e347bdc433e882d3