ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A1F93C6D9E54
|
Infrastructure Scan
ADDRESS: 0xe58a48a036318da4217a01faa439e39b46a99601
DEPLOYED: 2026-04-27 14:33:23
LAST_TX: 2026-04-27 16:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Synchronizing with block height 48774. [FETCH] Metadata hash (IPFS): f47b1306…dee37386… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x317a. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x29d16f7b315f8607ca9704b8dccb7ecd610a90e7. [TRACE] Return data: 0xfa1e0b88… [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0907df010a0fae300717e05b508d34cc7d9ff1e1 0x5ab06ce2285b1b6a1584ec7ea4a4e8911dd28924 0xe168fd6fe1cc08d4af418660f8edd8bdbd74d907 0x0a1bf93899c11693badcc87242cc574a8ddba142 0x6b40d06105d39187ad56966ab33e69d22f057dbb 0x58a191850eb2ff7a767c7411ec3be1f5dbed0d55 0x88b47fab2d9e5bbf4a3442483cf83fb57a973ab8 0x8fbb724a2fca66e65c0bfdd226aff13520779233 0x4bbf73ffd74b59356b741473637f119ab4dc2178 0x99e07374a9c9ed8ada51ca5a33720be7cf2753ee 0xb1929e419be3946793a4bed2c984d3d555843372 0x9e3e5de2aadba3f4bd0ed3a00f7870cae2eb8a02 0x685ecc3ea828f92df3f0348e13befcaf3d898feb 0xcd7dfb565da97a96f0940bc7cdc85527ee57d369 0x78cbea4d3174cc5c47b422972bb848a964583bc8 0x62eea188818cdb377ef6ed1d75c2a225905829fb 0x824cc4738a5288116b0955043c5f07258317087c 0xf08749e5357bf5bd4350e4760f5b7f33f3f9fd8f 0x3761a1575ade0e68205febb2247cd09ff239d62e 0x3b008682f8d70795a048cf1346a659e9703c0b7b
Deja una respuesta