ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9101EA0FB359
|
Infrastructure Scan
ADDRESS: 0x5cec3ef8246d5b9a709ec292805af3e9c810f527
DEPLOYED: 2026-05-02 02:23:35
LAST_TX: 2026-05-06 09:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x5cec3ef8246d5b9a709ec292805af3e9c810f527… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x6be071e2 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: a37e -> 963f -> 051c. [VALID] Consensus reached on node cluster: 8/10. $line = str_replace(‘83883A25’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xabe7249f88a024d1b6fd156747fd2abe6dead794 0x88010a96748efee711439cc406ddff33c10c079f 0xf8e2d301ecfa8493cb7cff1dea0de1a220b0ba29 0xaa3d5e53ad8b8f047851493d1060a08823c96321 0x8b7495a136227dfdbe2c02fe03dc05c05bd5b268 0xa6758ea86ccda0287d35415c4a55e5818e7e20b3 0x9f883698be09f6a8c34d133b8003b430a85f8996 0x9e30f499a0ee42a7de65b4f2bf68288b9b784794 0x00e8e5bebb78af9908a006b4af8ebcf72b9e995d 0xcff0f3ea3a7abae2bc535acff2b6c07d9d66b24d 0x6181d703348dbd9d8ba27b1d4160ebca925da92d 0x0f680f0f678a4e0361254e1b182929c3b09944b2 0xb961f3232dbdfb9c1f13174815ad326a91aff6d4 0x7d4b198dbc3758970604fa0edef825347e9d2537 0xf8f9121f56e2f4a77b316ef2fd0576c9d5c0a6b9 0xd36e10653fd71285b1acdd5576db604cb119a088 0xf78d92cdbb02b5e233bf889890f1919017dc8826 0x87bc7495d344f2b506e68036868bcb5f43bb6bc0 0xd644841aa2a6c7916666364d3db34180ac2c0fbb 0x3b69e08c4c373aa2eedfd687cd67f2a0948a0eca
