April 29, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-81BDD216B5AD
|
Infrastructure Scan
ADDRESS: 0xf459d4d81789965693713cf3af24a27260c67391
DEPLOYED: 2026-04-28 14:23:23
LAST_TX: 2026-04-29 08:12:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xf459d4d81789965693713cf3af24a27260c67391… [FETCH] Bytecode size: 8851 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 4 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 75 iterations. [TRACE] Program Counter (PC) synchronized at 1004. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x30860b17f984d0f909b71ab8d7b0c2e01c650479 0x46e65ae8f0954e7d2e127ff1d15be3242a7325d1 0xd1c3e6ee792d306323cf3e9e4461a86834b3e44f 0x2fc22143a04b71a68b804bfca054021879cceb13 0xa58f59ec104e5eea479bb7433c40ca9c5763f712 0xf79b728a89515342a050f4a5469bd777b959b466 0x3b9d79255c8ae5a85fda9ec12a24a1c15cccfd99 0x4f1c5290c23fa882794b6ef6888c5c07d1843f29 0x011b458246dd22e48a10cc2ad0e325ff199e1e42 0xacedeec3360594b7dcb4a4e4987907b3216c2be0 0x842979fb52b0c19629ae3186838fccbd06484697 0xee834ac5daf6e23c2a9e47d688edab8f117709a8 0xd80d0131533b7831d818fc665efe1c22dabf81c6 0xd478134b62be4140af9650df55cc42fc0afbf6b5 0x342f8e9b889bfa63e46eb52caf89602c24dcc3a9 0xd43d9f826072218edf86cdb6b74246176e066558 0xb66022a5e1cc31d1b1dd79d75d99808515b0e88e 0x65353e52003d1c888c884f1ee5780398df26cb04 0xb9e9d8170eaf140538f343371c43f1f3da86c646 0x7fd5b01eca8716fd890d5dc61c1e84a6121fd65e




