ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49D8104E914F
|
Infrastructure Scan
ADDRESS: 0x4c0798d6a09894c54d52550a301e6f0eb2f6e9d9
DEPLOYED: 2026-05-07 02:44:35
LAST_TX: 2026-05-07 04:16:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 56956. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‚SSTORE‘ cost analysis started. [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1ee9e49fdc9792ecdeffa18851d9c27c7d68201b 0x42b4f3bd0975e2246882adccb5ddeaa2564c7384 0xf68940f5e9f71c94bc2dc668c588f68949b66344 0xc1ef499dae529384a9659783238ce20a37f6788d 0x0ef287c5525ddfe4bee31ff4e073737754bbaba8 0xec57a233904909e406045449ffffdc174ac77e7a 0x62904606a8f3a6a5699d09797e1932952e1813f6 0xebae05e31ac8b52ea9d301116b0e9aa923c65bef 0xbfc79f3d26af1b604796833396f2bcb64f8fb629 0xbcebcab06e28ac86116cf08f10858e7c8ea748d9 0x6181d703348dbd9d8ba27b1d4160ebca925da92d 0x923442c7f1e2c8f385ad92bf83e1b93a22f976c3 0xc233fced6d7c1d671f751a5ae025196c5bd1681c 0xafa6decc9e674f9a4c2d58a6cf6bfed0ce76b908 0x221e9a77115ea3174bb359bd3b714a5c8b93dd1b 0xec770d9f1d215e9809e3dece1d86a64af0d344c4 0xd7adc364b14304383a5f18c52a7f80e42bd8c91f 0x6719873f7f6a788c971a21e1623f98acfcaebd5c 0x298dd4691178edbc79be29ed932e1299e0bf3b2c 0xc401c2fbe557d79cb0619e9f0b130dbfe5fbd377
Schreibe einen Kommentar