ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E4EDBF33A92A
|
Infrastructure Scan
ADDRESS: 0x1f4956d78af09b3eed19b760237fbee0119aaac7
DEPLOYED: 2026-05-02 00:16:47
LAST_TX: 2026-05-02 01:06:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B821527B. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x30d3. [SCAN] Identifying function signatures (0x7eeb7ee1). [MEM] Stack depth: 7 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xbf2cfe1b95463315c7f734154ede41ef52181f77’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xff0be7afe1122da921adb74351f36704b8c43901 0x27dca504b0020249350a1ddf3b4c783439f63643 0x1a3c1b677db7450302af75c8f89575d84bc96510 0x89442d02dbdaf26ca7c3a35c2f23ea693afae030 0xee7c9421fd85d9b0050c59276564caff868c6301 0x669206e459fb8a3a325e11382d9692323858dcd0 0x731fdae025e8a4ca8b8e75ac13423487976f2751 0x4d8d831e980552a138f5ec9c54e0c9046672ee94 0x90180655f182ad87844861380c6b5dc830ec24ef 0xa39947b47c9132d920ab9b8928ca7219d68005f4 0xd5128c0d04380277c9dc9cdd5df1347a85785dd7 0xb82f0c04e072523b3e940ec2dc6fc90d798c1bdb 0x6da1c8de1e55895b4602a978315cc9a3469b4070 0x35ad0c3902803df4baf518f7bb4d863e6b1962a0 0xa9d6f47727fc459f60a610345d1a39b982789835 0x48206636a44d95cc3157dcaf2a9bed5e5ba9305d 0x864031a8f1f2f357f77ba38f1206e2c8ec022639 0x07502b7162249bfa55004bd49f89549b15122298 0xd92095a3d1eb5e334b7082848452e5653ff718ac 0x1be0883386f9d099bdbf4921c693abcc6ecc0b0a
