ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C5DEE6993E80
|
Infrastructure Scan
ADDRESS: 0x5a0c123b9c3cb369c51ae3287d5fa1c88bd4004e
DEPLOYED: 2026-05-11 19:02:11
LAST_TX: 2026-05-11 19:51:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x5a0c123b9c3cb369c51ae3287d5fa1c88bd4004e… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xcad5032c). [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x1890fb7c6ee88350b7509f236194da366a2c7ee6. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Scan task 58E22FFE finished in 64s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x13e17b5c59aaaa61c48cf21395fc8648c85aa6c6 0xf04efa9324f68441989bc414af1f441e5a48f42d 0x42bdac7d84523aa8d37452ab9625d025f6657122 0x917e56f236dda31935eb61cd9e80d7e6c303cc3a 0x0de4d5c07e9be106ad2140a661ef96963aaf96df 0x933479ba627356f7efaba030504bf1c65cffca5a 0xfc2c93c9adb7b0b93fa67b3aafecd74538887b00 0xca1f0840a89c869e6eba2031e4400f8251b4606f 0xc4ff1131c4000e118e8466fa294a0b16e0628480 0xe7c0015767a25d0396fe57ec0f28f3f30dcef103 0xb611e1e16b2fe4fe722f767f864309b9a70c3455 0x55304fc316429bf9bc6c0c7a55afc53f3306fa71 0x361fe630745441703cfe49567a2e4521591629a1 0xe44fef129507fb07a064f47e72fff5ae16deed75 0x7feb50948622c187fbdd3359bb358f4b70bbe783 0x7ef10f65037058b152f6591d6b7dd79a95af8d61 0x5c0179532dd7d5d19d5ffebc053bb2d26a065fa9 0xa4939676761966d59acee5b47ae57d02ca717b5f 0x50d3e153e4fd2c4015f9c3427e4687d434ba80c6 0x805db1236facb50b68c522423953b5cfc1ef19dd