ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5EC230AB21B1
|
Infrastructure Scan
ADDRESS: 0x0375fe8e74737ff73e114d9082ff682930cd9f64
DEPLOYED: 2026-05-02 21:05:11
LAST_TX: 2026-05-06 07:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x0375fe8e74737ff73e114d9082ff682930cd9f64… [FETCH] Received 60 segments of contract data. [SCAN] Analyzing visibility: 2 public, 8 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 44 iterations. [TRACE] Call sequence: f1b3 -> 1907 -> c2ad. [VALID] Finalizing audit report for 0x0375fe8e74737ff73e114d9082ff682930cd9f64. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbe89ea33eb0668e934e767f8376d6704c7bfb8e 0x3612836dad3ba620f9f305c3fe747dd8372df827 0x8c89be0709811804541678a35ca1d050364e0f84 0x86ee8d96bb7aa9846525f98437bdefaaa2444980 0x87b723960c170561e6b7cb74188b5f159e272c74 0xf56111b24535e9602587c346827b54c7864e0447 0xc3a5009ca7ff573d6b5dc24e5fb8723423ee69c7 0x9a3799f093d44a9fc6c8f1209e2ad340e70944fa 0x1521605a5d58e6960a4c5ddd05355dcb89114caa 0xfa27d04c46037a9ff2e54db043be09f7d7715a98 0x4862f8164012b29f393be1f1ff1fd4c9cf953fbb 0x5ec245e68612497ed5ec8dd4a04de331becfb59e 0x0c6f8a4cbf778233727574c7a2f405f79c6f01c4 0x57629be18c9cba3931ea0683f60876396f47d5a8 0x3035741fa7c66c95ae0c6210d4bda021b6e1aa58 0x7019723f5db85b2d9ea0e462945aed372ef05240 0xd7ad3257834bb8149ed4f52c876eb54bad9bd0f9 0x3dd74877b14107364a1d5d8d79f3bb5521a77f94 0xa0119b1fe8c8574b0454249f88e85c49b6180d68 0x016c227337e68200869c6c0a944fce0dd97e7d8d