ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-58077D6661E6
|
Infrastructure Scan
ADDRESS: 0xfec5db3e0b274a32ddfe2339997fbb6c21724883
DEPLOYED: 2026-04-19 17:47:35
LAST_TX: 2026-04-25 06:44:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 49925. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x1b94. [VULN] Warning: IS_DEBUG_MODE found in storage slot 87. [SIM] Verifying ‚require‘ statements integrity. [TRACE] Stack trace saved to /logs/TRD-71B24BF9.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: ed487fc536a24a64349a294ca30917ffbf80d474456780fcf9077fea3f0c523f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbdddd25cb5566ee5f9a1e7e5089bda8bedf70c92 0x0ceccf044c1f64d5217296a8164e03f19dc06879 0x4bef3893ee386e710312384e3c7146dc65bded4b 0x3bc5b4619eb3638c0559e786c650a8b45ea430e3 0x7136fa089601205428dfc18edb5a6766d5973bea 0x5e1668faa92cd2d211949f1f3f0b7406bbd06817 0x2ffc51cd50ec4bbd432542a18d2b5f41723c84fd 0xa9c423aca7d1b64abfc080e49232d9dc7533847d 0x9404bfb7fab1624958bf39c25f2043ff93b47bf2 0x2b73b87d53945f7e6e6fe9e24fc31fef5ff2bb2e 0x871785c500ca8befadaed780e6ac0e8e7649fd25 0xd1da2bafe0376c8bad5c1f90bb565468dfab8e2c 0x99f7c11a7090b9bbc2f5ee015210eb4261133b10 0x10966ce24f9f2fb35336b286da44785eab9e8627 0x47d56320e1b24ef42253a3744035257897297bb7 0x363081cb50fed658a33807f0c15e6352ce6aac61 0xe6b364ba301fe4dd3c70b60c36f0edd14324e4e8 0x4fc63f0746a52c443f5629a906738b931d791ed5 0xdccf6426a315128ab0fac5268bd6fd9ae39677d0 0xa6dbdd59318e212ad3eb6ca002d5de47195ca27c
Schreibe einen Kommentar