May 09, 2026
- Post by drluis
- Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FA7CADDAA797
|
Infrastructure Scan
ADDRESS: 0x02a24a711bd40d3aac3afc4da120facbc70435c3
DEPLOYED: 2026-05-09 09:23:59
LAST_TX: 2026-05-09 10:07:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x098ec8be successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x1ea3e915 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 5453… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 99DC2703 finished in 58s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x37f5ddd9512935793141680a48da17b6c38db17a 0xf7d40f3cc68c0cec105605458307ecdadb3cf4ab 0x25681d42ac84072756858ca4f3798ba45ce6ac4f 0x4f742410366492f87e0e50ac06edb4e3bb5178b0 0x50d528460dde50be0189975ac0a262b791469b6e 0x1186f7d28e91267455479bb8ef94b9792ad03e20 0x1482c129d144825ceb28a9cedfcd7b6b8a4914fc 0x7b5258637b5e7f3e9c1a069b017d3d31125522ce 0x2f0640f7f14f676c5ab648c4610a95df1345baa4 0x3582d0faf91a57dc892d3e293d752005314d12dc 0xf114863b4d9b76922e42ba193d282654653736f1 0x90bd0f7f256e7ae64cd891b80be16337860a0832 0x5d688ab9c228dba09bc1b4a436506e36a6d057a8 0xc356824a74fab24a6a35259bff6339a5e619ac06 0x94efcee1ecca62bf919b9c44ae98fcee99724a64 0x9922985676975b803b0b8340ee4f85f82a664348 0x4866331b8140a164a26c6e2bddd99f2ee2c99b30 0x01a0f28833add697b7bb637fa73e5e882d64fcab 0xe7e577600690a04ade409fb3e22c3af13fc60110 0x6ffb04ce961f512c4957cb86b29d578cb9ff8ea2