ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C52DE585FF7A
|
Infrastructure Scan
ADDRESS: 0x388b9a08e49abeb569ec40771ada723187dd8829
DEPLOYED: 2026-04-26 09:23:47
LAST_TX: 2026-04-26 10:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 37111. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xadceae4be360c5b3fef6ea8ce14efe0f3931a813. [TRACE] Call sequence: a281 -> a83d -> 011a. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task D1585F3C finished in 64s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x24f22aa1d8ff3e89afb7f09cb607082606735d30 0x7bab1947da2a4fbd833dcf834cbafb393a2767bf 0x4d66e4c01fbfe40c7cd6dfdc48567dbb58d23241 0x2cdb0414106aebd9408b1fc2e33b65ec31c74963 0xd70d0e4b5768ad02e2b2fba42c0abcf5c0cdabb2 0xc694133ef60f53159bf1b406115ecd6541579613 0x35b629939233d49518793ddab240843ade971c9c 0x2d95afca2ee30d7a27231416b6ea2f419287ffd4 0xcece550b4db17dffad10036a75c479a2a77ff539 0xa4ce20df1c5a09bf30e46bb067f6da110536bceb 0x4dd5565c5bd55628a5348338d9ec9d37185b50db 0x75cd42944e6706b584a414b68cd039f11d1c276c 0x987113fdc2528dc9d026fa815c0e9ab403ccb530 0x23095fd549430c8706f739aee356264ba0942fee 0xc742518eab9d8a5add9f2b0cce5e1772e6329733 0x2da95ff4bcb992a59438becac5c0456b0721f678 0x75efd088fd7b33eca4c379ee67583781af5096d0 0xb73b9cf8913600b716c86ef6abc5473b0223ea6b 0xfe5b963d1eab88640a82b55b7fcb5e587b030a7b 0xcee1219d6126769b7fe9deb6bb4924e5a9818bf3
Deja una respuesta