ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-02F483989B50
|
Infrastructure Scan
ADDRESS: 0x1625d64bd198f13ee2c940dafccf99ad0852b6f2
DEPLOYED: 2026-05-03 15:41:11
LAST_TX: 2026-05-03 15:58:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x1625d64bd198f13ee2c940dafccf99ad0852b6f2… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x77a32947 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x30 analysed. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a3bee9be1edc81495a5aa667c78f4548410e3ca 0x0f20778472c8773ff0943ae617b59ec270cf27ca 0x6b907589d355ddc3251e69723f181ef311d5dabe 0x7f7e156455e36e375cad0bc3e95e25d18db9c6bf 0x665ac1fe446a49287bc34da455f36f560738e2e9 0x1dd7f65a7f50d0d6da8140898c96efde753f5b74 0xa7cc8ace15bae9c69063ad0e57ef209654915df0 0xb4bccd83209056e933c4690f4d9c7810a2294a52 0xddae67b061d66051818783d4965900416a193c3b 0x4c1f0d66fc265cb5353b423938f368cf42842c55 0x6dc3acb8b50a516b52bcf54ff025260eb21a7bf1 0x33cea165699058014058e209d8f3c5e56ef5240c 0x99f9a1daf424dd98bba80b4389ff70dfeabb95a9 0xd2464ab7de25be3fc9db1d89b54962ab05dcae56 0xf70d2ed6b8e1148ef2934d91ef15724e1ff97e16 0x030a8be7097733f301f0591c48169340766c164b 0xe3b2e4afcd0e091ef0fc125fed20128101bc774b 0x9ccc2d3b0b1e99950b49856d103addb351248724 0x92eb014f7ad1509ce14be3c6c6b262b29977e74b 0xae610c428c3fc730df79f7c6d1e24a4906442129