ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BA0A1C17A60
|
Infrastructure Scan
ADDRESS: 0x609b90c1b632a971ede1cc8ab653d11f2a54548b
DEPLOYED: 2026-04-30 12:44:11
LAST_TX: 2026-04-30 13:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 70697. [FETCH] Entry point found at offset 0x9efe. [SCAN] Identifying function signatures (0x5dc60e95). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfbf17097cdef7b84be3125eae4f8f6247d1f5fb6 0x580d0b5f1b88a7e06317ee60ec45e2103459fbe0 0xeae5509ba68cbfa8c161406ec43abadf8e7aaf55 0xb82e0416e0682b3d8ffac6b34fcf4ee3d3299203 0x4e2c4a0b67218847fb40cdaff095411fa52d3917 0xcafdcd9cb4085a9f00724c5c502ec058e8d039f7 0xe17fa612c1e52fb77073d745f3afba50aac5045e 0xf4c053fa70d584b9883894dae2c3545725ecf337 0x9c4b7e5c35806bb392b9ec1f3ff3453a1344d3d0 0x159ab90c6f586e56ac31da1d59eafe14f2d26c45 0x08ed931a0247ef68a734a3c6951d703e51c0cee6 0xb8aec52d3abb81d4abb3062722591ca96ab583a6 0x6a779da0902e74b846d13867291712daa59483a8 0x323d4990aa1515b895a3a4e59e0e2582ec5a39c2 0x3645f5f6686da48bfa67c92e5c0906a3c552b9f7 0x86f2f0a2c7bc312d20fd9c22227f352fb928c901 0x1b5b89fca222b98019a2427570a8939291da205a 0x0d926227bebc2c2118c2197e00bf17a62f279b74 0xdc51f02a9cb9b78107e02202b7a73035659df4d8 0xed14f55a65f2d7462ab1148cf81c36c6d14d91a3

Deja una respuesta