ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-19A76F290B48
|
Infrastructure Scan
ADDRESS: 0xf7030067c234cd5f2b176f081de156e03fae3197
DEPLOYED: 2026-04-28 12:23:59
LAST_TX: 2026-05-02 23:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xf7030067c234cd5f2b176f081de156e03fae3197… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.11ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 6987… [TRACE] Program Counter (PC) synchronized at 5088. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1ec6acec9d5459515c538618eb6b3c48ae09ae7 0x6ac7afa5bebec6cbf27fc9ebb8cf1681550db6ee 0x87174e8f527129921d3b33e6d0322d453a9a0d5c 0x003f1ab28df93704fa350b7f5bbe3238e4a98bd3 0xb555d678b039fef8f9c2da755116cd1542ca16d6 0xf5e458a4c0d9f63377fffaa18239268cbb7df375 0xd3104a6e6d53b37061856fe1f31296d8962f9e01 0x6d1be1890fbfafd74bc877240b0ee0dd18836d0f 0x67b625e5738ffcdd580aac59218c75914d6acd47 0x8c941323c625f58a3313214aada6ce868a0a63f2 0x5e987b6aadd4dfc2236d21ede6d07feb04350b06 0x621edd5f0e7e496cf11655c4bf0f12e15817ad8c 0x097447d6e4d241da56b0f06c07ea606f81af8dd9 0x135170f54dcb9dd93b10867ff4d05fc189f0e50b 0xd9b3d6aaae1dcc0ca21405722077be19b5016611 0x075a058b85d7b9eabef75575b9ed6f19949861ef 0x05440e0d91b47d6fe61273db8ddf1c0bf32f757a 0x7511a8580c4c2008c801207ebd19b52847b1815b 0x2a2e7188f08b35185dd34a58281a66edacccf673 0x2750403a8217248f436c45767b4281347a8889cf
