ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-360E3A922575
|
Infrastructure Scan
ADDRESS: 0x4b0261ef8e67ee5729d42837deb5ba0da5be9c8b
DEPLOYED: 2026-05-14 02:18:47
LAST_TX: 2026-05-14 03:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x834a. [SCAN] Detecting compiler version: v0.8.78. [MEM] Tracking pointer 0xc89a1f4f in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x62. [TRACE] Bytecode segment 0xb8 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9d8ef9aae8d957ca55393fb32855220625375b70 0x18a87ee0607aa4fe273d9e637f46b66bf507b2fb 0xba7a6626169443f0988bf568b8943b4794c51f0d 0x6523534414dc7706c636214e2fae1428143aa9a3 0x13678b5a71d62e0cc439a814d6af5e855bbdc0cf 0x9f6ce861346ab7063d3165b1e98335eba2319770 0xff7d50a59f15956431b4783f45fdea6ee269611b 0xc51cb9b43975e1fd7334e87debd793f1f2fb15a3 0x265fd1869492b6ec9fb456bda0ca0698c246be5c 0xe7bb9ac1cbf7d013dd9ce733fdb8bde40afaaee8 0xc133dbdfe5e10b6655545588e8e9d064cd8167f3 0xc7908f434f74e928f71bd3e70c98eadaae87fa6a 0xc07085afeb08e886c921a201ebcf1334d2881930 0xae7ba272b0a5fba7c16d9c4ac126c8d789b25faa 0xf59b534e244769e6e8a8347c6c99fb63481ce59c 0x3199331bcda94fb753c87764c08346959b91e84f 0x96a1b58b1225634365cb5245dffd0944b216dadb 0xc581a2655f5c573b7a389500c5fcfdf3ace1f0c7 0xe0ecdcaa74c8dbdffd1652ed4b2aaa1e1baea72d 0xefc8f03a0404cdd0d6fac35f879a031e31a0b851

Deja una respuesta