ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A1363FDF7EA0
|
Infrastructure Scan
ADDRESS: 0xfc3d4a5f473cfde5362d54ef0e73401da1728dbb
DEPLOYED: 2026-05-17 20:31:23
LAST_TX: 2026-05-17 21:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 7 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x6a02e213029c997d82923cd590be437a8a6ee36c. [TRACE] Bytecode segment 0x19 analysed. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x6a02e213029c997d82923cd590be437a8a6ee36c’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc0dd53395052d1b6a679e95d2548e00eb2bec998 0x58038949a95602d94beec01b937573671db5081d 0x3386b8c7fe910fac21f892cbc90de1b81ba7cffa 0x47250006a849352b0485e081084d4ece5831f1de 0x974f77a5db6690dc13449ccbabcf2bb37210aed0 0x555c3d4aeda804df5fabc84198ba70e21d5105a6 0xb4e2f55bb93acd6f0703dee2cc7a42d42a526b5e 0x38914ef8164c4e833862a54214968d05da3a0369 0xe32d849d1fd31f17bc6798713780865ab5b450b7 0xb682c79dbfb5a9da074f212299c0fc8731e8ff19 0xd8be611c54443bf2e65723fea5aec7c12bcc332d 0x3e2215ca3cdb3503f22af4e61dabfba464753a39 0xb166fa9660bd49d164209d9dddf9c7ef3ff12798 0x15752850f2d02557b07716b0c7ea047445d861cb 0x88899a15c5f25288daad23c68adcb0cb0a4b33bb 0xa97aeafda2fab40224696a32c4736df047947a82 0xffd1a9da9a20cb5a48845a49f1f61c30e5614d11 0x9723ac17a99d3e031d138efae739f13b454efdac 0xdc70387b0e4b4bfc18cc6def2c5d9e219d9f6fd5 0xa648c70f51a59cfcc1c6f8187847768308af0b3e
Deixe um comentário