ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BE231D80C12A
| Infrastructure Scan ADDRESS: 0xc090711845d2b0ced43afa4c0bfb9a1f42624274 DEPLOYED: 2026-05-13 14:12:11 LAST_TX: 2026-05-14 15:40:35 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: OWNER_PRIVILEGE_EXPOSURE |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xc090711845d2b0ced43afa4c0bfb9a1f42624274… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0xe5e24ae2). [MEM] Stack depth: 7 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xde9de92ad32c5f821af3cdb90d626051085ffd8a. [TRACE] Execution path: 64% coverage. [VALID] No critical memory leaks during simulation. [DONE] Scan task ECD39B42 finished in 29s. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x113a66ef1a7c3faa9015efe742852c3f2ea45b4a 0x385dcee9b44b10e11317d0af3be9170a1f996357 0x6ff7ae26fd585f1982472acbc0b84f5a4ee0e813 0x220a51e11626c263ad1d534d8093ab0ff6deaed9 0xa0b4e6e5f2fc9c63cc90baa1b2f33f71a23d4945 0x5aa680ddc89846fddef58819023815c084da09dc 0x50de79051d2b27484e9aa28fcf336504cd00129b 0xa59c83971760a03d6ce786587e42ad5c8449f819 0x22229af5a9ae65fbe78d4ca0ed6c34881aaa8dbc 0xd631fc627edff21b4926fdfbc4deef4624a089ae 0x7dca96923a33c4597aab9597d88ab8ad47b5f233 0xfed2435cb2e9a577997a76f3a72d4854a7b9afe4 0xab6270d7fd38cc0dab54e5d6aef7662d934f8893 0x1061f35c2c94ca5539edf1830da5daf060435aac 0xf4681afc30bc43ca6c97c89ed76125b1d976d777 0x59cafc2cd85a700d77e222efb2249fa2ed90fe47 0xa207708fb4cf15e663b231cf050b6dfe1f6cd517 0xe5f34a6b1da759dd9bca71158981efaef8136fcb 0xe7519a580b1b79d5d09622239db213de5717042d 0x3d1b2e3b56c058790761380d2ab864328153aa47