ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D6786043BF47
|
Infrastructure Scan
ADDRESS: 0x983030d23fae719d63aafb05b4041892fff9a173
DEPLOYED: 2026-05-14 10:56:47
LAST_TX: 2026-05-14 11:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 10. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Detecting compiler version: v0.8.11. [MEM] Tracking pointer 0x5b4210e9 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xa563ca5b7be6448e7939db86335159a40a7883f5. [TRACE] Program Counter (PC) synchronized at 1992. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c2bdac199903fbee4ad76beaaeea96ff9e6b3d8 0x2b140fe1cfc23eadff9626e27c2aaa0eba58a112 0x1d6bac431bf4278fb6b26036dc5cff8cf01af6b8 0xfdbc9958094c17acd0bbf95f172c8339b47e878a 0x9dbda847caf12888a827027a50a6ad8903c443e9 0xb611e1e16b2fe4fe722f767f864309b9a70c3455 0x86402713505d682d16b7d8f2d2f25efe530747e5 0x40a62a2ed4d65216c626572a76d4d046340fbe39 0x5c6503f285b41f2ab256977443cd289e5d4aa405 0xc0dd53395052d1b6a679e95d2548e00eb2bec998 0x0b7ddf8ae4b403cc737c4843e0c567c91976fa66 0x93fe075166015460361aa98f85a017ff59ce664f 0x46d237137dff34b1936c7ea2ca08835a26648a68 0x8bab69fad62e0e17313415e7f28ffb24d5d3c57a 0xde4e7e7b4af626c9a77356ab1c0c036b110f1e06 0x4e0e307215aa275bcd0638f7c58c76d15d74dee6 0x471c99dddf4d547d49e53fee6344f161b645b294 0x0b6c705fe33d9c1414572d57ce7cd199b630621b 0x18ad881a1ddcdaa1f2b6f1c68070564dd14a592a 0xc826e343ff3767abd61615ac622471263526613e

Deja una respuesta