ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E6AFFC35B36F
|
Infrastructure Scan
ADDRESS: 0xe74200193fdb4195e8b7fc2d263af4a8322b5a5a
DEPLOYED: 2026-04-19 06:15:47
LAST_TX: 2026-04-25 05:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): b0ec4838…39a9fc60… [SCAN] Detecting compiler version: v0.8.70. [MEM] Tracking pointer 0x1fb7443d in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-28E86701.log. [VALID] Finalizing audit report for 0xe74200193fdb4195e8b7fc2d263af4a8322b5a5a. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x943504860d5c5a111868c22b051d5026827471b0 0x52f6febdbe4f281b6ee035b46d99d83b08e51bdb 0x62dd31a3e121673a60d1e54e982e6a195a812ab4 0x72d9edbc6ef3574a3ddd3c9965688fc659c74a95 0xc9d2ab10b2926d9f60abae793fd6e20dc575ec8b 0x0d1257e031447bbb37eff5469d4d2dc45b79a82d 0x31b020d02b2849950526ce3ae5dbb2ac98180a75 0x4ee6eeb2a395a72195634dee0c534eb91ef680c1 0x78a5175cb032cbccb4be98aa3a0a0b234bd42bb8 0x88fb7dc338722c6fb9c3f1371dcc2fabf0a8a2a1 0xd554b5bbd169eb3bc691c8a93d2744040a0be8f5 0x4380a6b12fd183efe7038ce75adab1d537086b5f 0x9b473ab7bc69fb1d4c46343a0bcb53ed0ab5fdc0 0x0cb9d84d4bcec8d3d5b2d99a6f07f4605325987e 0x3686f7139487f589de9549a4f8d8ff32d0ea6c99 0xf19d1a87e5df55743cf67fe17f36a6887c5c7ca7 0x5bca4feddcb51ed5f47445ad60132067e1f904c1 0x6f50ccead6f1fe0e392949e4af843c7b5938a843 0xce58f34a930c3a3e23cfaa42f152d9530878ada4 0xfa047a91e1841b166c9479f9dc51c355db60b2dc
0 Comentário