ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-67F3B685D84A
|
Infrastructure Scan
ADDRESS: 0x120a0b6d641743551d7623f0ca0b611653a86430
DEPLOYED: 2026-05-01 18:30:11
LAST_TX: 2026-05-05 12:39:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x120a0b6d641743551d7623f0ca0b611653a86430… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 1 public, 5 private methods. [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xa9. [TRACE] Return data: 0xa8a99b81… [VALID] Finalizing audit report for 0x120a0b6d641743551d7623f0ca0b611653a86430. [DONE] Log signature: 31162370a5cc0ef4778cbbbba838d8f6c5aded934ea06bdc71eee69db281a29a.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc26c978c5b7335585f0574b1b86a8e0b7df70729 0xe5ba14970c4e948f12d6c6305bd6b75a6f19a018 0x3c4a81466d94baa5698743b9f9d9545e67227c55 0x7d6ee29bdb22469e20a31a40c3cbb529317d13f7 0x2d389940b9a5fbe1548075ad51c2130a668e0e13 0x2bc67d2cce7013aec27b172e393b82edaaa2b64e 0xa45921b07610b046b2e97562cd4f7c749ae5c875 0x262bb364e7c8d457beb0e6063b5a864b3c05d76e 0x79f145ec07b209e782013ea5932c553b5f56ec3f 0x6265fd688e391ff754777e3dc744752c4bfaff1f 0xdac8654b397ced488dce2a5429d1530724857456 0xe4323afec9f180f861ed61c21d5050455f838ee8 0xf9af04349a02d4684a3dc807ccb724b574343d52 0x3f76fc4360e8b16e3ea2e35f918c9f3734ea8d3f 0x51407137ea804d5dabfedab1b6821bebf3ed1d8b 0x294ad10a58e9749c727c47662b8377f34e82a766 0x5fd7787fcfcb333076889c0ca608b2a5cf426770 0x46e4f9f47cf52faf2fcb93451153290275f88473 0xc0eae515554d579460fedbc6401d5fcf0e7ce5bc 0xdbfd93b6b4ca3fa11d28abbeed91ebe5ebc74bd9
Deja una respuesta