ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-38E765010CF4
|
Infrastructure Scan
ADDRESS: 0x94df9d394c5ff90492f3e54759233f23ccc2ebd7
DEPLOYED: 2026-05-06 10:13:59
LAST_TX: 2026-05-06 16:08:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x94df9d394c5ff90492f3e54759233f23ccc2ebd7… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x4495. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Return data: 0x8397d166… [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘35596141’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x23b26f0372d263a34925e3eb406725bc85f00c63 0x6fd4188711beca073e2aa922616600dddb82bb63 0x26aaf49a1fb5549c5313a8b104ac71ae9c290d0f 0xc5cd4f265b3e274e60d72c6f0bc2f3f0c6ca64b7 0x841a3148d52f8db36f890db4cb4f67b6f93ff132 0x6b9e8728c8bf4b0fc911d1baced795c6c07c090f 0x85a2209da4bd4614d7eef99f98b64659635f752a 0x6dc10ef99810f1d2d628dbc2bc825a82e71bb4a3 0x5c5bd48c6c25a71759c84e8be636200ae47f1725 0x87495384b4477064fdfa845d9f8370dc56189e91 0xff2713dbc2346c0101904a961c960edda05e0045 0x2333976eca21df8ae5f806f2829da6c82766c1ab 0x3729208ed1e171c9a48274d300b9e70d2d054aa2 0x62c30af83199d5b6e8bbde43757401ddc4d49b4d 0x02bc3b717733855ed64ccd023f8bb4269f3555a4 0x7d3f2d6ce2ab9e98d65d9cd28bca26879c42923d 0xaf26b6422bdd4013ae8521b3730fe53868e52efa 0xde2a28a4a9dfb31b26848e735f8c4850e56d59fa 0x2627eaf4b662cd2452786fa35dc471bfbc851ce0 0xced919d36256da63d43e7831ac7617b0bc72feae

Bir yanıt yazın