ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D500BC1BAA40
|
Infrastructure Scan
ADDRESS: 0xf965b0b184e36081d3dccca87264d07e5d1c2c8c
DEPLOYED: 2026-05-13 20:00:59
LAST_TX: 2026-05-14 00:17:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 42ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): fe40699a…eaf9db44… [SCAN] Identifying function signatures (0xc36f95dc). [MEM] Virtual memory mapped: 0x0000 -> 0x3fc6. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x17d8092c00ba71338fd0aa8e6227ab316543eea3 0x15745d79f85081e9ac3d3e6ac1169b001a2aef0f 0x67ed85de672537808db45bef823e19621f127240 0x78da690c2b9ff5b0de79f590a5d6784305302d90 0x00a7aa1a3cde1a1a04b75158934f9472c5c6a4d1 0xe55ab6832df4b4f42348b9bf7f648538e0e55f29 0x3acfe0af8513298719bdb674993ffe961bba9077 0xe36eed60dfae6fb68ae2adae434696a30b4a4b20 0x6c0660981e571f5cfe78f738d2c2a8bca333efeb 0x9481a259d60112f305424ad0709132112e5d2b6a 0x0fe93ce914715c729d1c57740dd39d62fc470ff1 0xa906f29a1340df994d865ea160454870efbd24c3 0x847c15726913340cc03255afaf484a3ae70276e7 0xeeb5736ac4e1832d854bdbb3a7ec8893ccc91b7b 0x9f88029c36b0aabe30661d31939d1667754faa46 0xb8523b72eec2838b52cac9bb1c53a91cf565c9aa 0xbb741a796ca2d7cf6fc32c2078352f647b261368 0x1750e17e0894e1704e1facd67bea88f2fb5c78fd 0x0a31081d56d3af81d0a4ec73136b6c99ae77e601 0xb7bcbd30ec9f50996024ee1795dcfbf222161b6d

Deja una respuesta