ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2C8621C1FF2C
|
Infrastructure Scan
ADDRESS: 0xfbee9766455845dead42c34cb9ed9de0bb609b37
DEPLOYED: 2026-05-01 20:23:59
LAST_TX: 2026-05-01 20:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xfbee9766455845dead42c34cb9ed9de0bb609b37… [FETCH] Bytecode size: 9251 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 5 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Balance check: 6.96 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f235d7bd94155c424ef71a245fcfff2d38dcc9a 0x827daf526575b20856f25cc14a3668e850ae6cb7 0xfacfb55b7e1c5b2afb968cb4cd52265ea6252d3d 0xc4c139852a71b4c4b317a9cac20dbb0415f3cdaf 0x74666d8ebf246c1dea37838420d11cc850f9fd08 0x3ea2025a9552c89c65b75da7fdc4362191421544 0x59a118b68512bf8204421fad4cbb6ef0351a7c16 0xcf6a7ee3590c8f6f5df219d5c86a7fdc268aca39 0x945ac826de12e342ea766c7ec9bea0d0e9a6ad37 0x5b9b7b68182a33e470c0fc7f63c289188a6f6ba9 0xfce21881a60dc760cc6c05277f763de39d2e9909 0x9ce43b6495382f04108b752d1d3cc586cd03c552 0xae61a9fad96d5d3040013640e5d1a9d6f914d854 0xba8eec35c0c83623a90e7db94e7ce9a7d5496981 0xad475a35d66cc40bd1bef9bfc5abc18c351553ee 0x9000ea9452ee5f840da23fd2863d02ab0ffb6016 0xa5c70ce843ffe64bd0439e69e13ec59372d451e4 0x7d7c2e759712f50d515cdebaba3d96fa43b99d37 0x6ef0d1a9ee051a6b263dc1ba5388febccd542d68 0x0ead534938dad7900e74310c7e333630f871b212
