ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-494189FB6C6A
|
Infrastructure Scan
ADDRESS: 0x05d9fe6b71a77dbcab841bef1ef1a3406f33b62b
DEPLOYED: 2026-05-16 12:10:11
LAST_TX: 2026-05-17 08:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x05d9fe6b71a77dbcab841bef1ef1a3406f33b62b… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x3fc7ea6d in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xfac2652d9a8d99df44e95e7ae7b70fcf6381f636. [TRACE] Execution path: 23% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xfac2652d9a8d99df44e95e7ae7b70fcf6381f636’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2d5860904e8071e63f35da5e3d38125e06c82b1f 0xcd2ea34d16d57d896ef6821f2e9c5aae076fdfbe 0xd910324aa40f1c2280e042baa7e1a73e9ea33adc 0x7a1efc8b1ef04322cfb0ccb115336017d6c95fea 0x72e42b208ca865dc74c612187cc1d23bff6b59d1 0xf674c54e3b5befc0b7061fe09eb29d80e75b6cd5 0x693aea23ff087b4b0783ba31092a49f306c72186 0xbf97608c788ebab1f5621d150d62e8d7f3b20131 0x6cb0e88a9b5f38050ede82e1ef8cb9c7eaeb2f15 0x6ea2af9c47075ca76125d8558380093ffc8c52fa 0x8a91fa1ae9e91d088c521b36a1d102da98f84914 0x6e5eef452a3c79519b0e15b826c44000741f9a01 0x07d43e8c3ed3cc74a5b132413e00aaf59720be2a 0xe06db5ad916f7afacecf408b57afcebf57e38927 0xc529cafa96a5003e0f419514b9e42403880f9ca4 0x9162fbc1e292a35f2f49d03ff5e013ca4220b448 0xaaf6a4b2b0e4a556bfb24da800d5bfc518a2252d 0x91d3791de07c7241e57b9805251d8c7be70223db 0x182526c0c72ffb5301e628fac0922430b77ca075 0xde231988bf8c6f6affaf15d96fa0d6a4ff8847fa
发表回复