ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3849D59B1065
|
Infrastructure Scan
ADDRESS: 0x05d9fe6b71a77dbcab841bef1ef1a3406f33b62b
DEPLOYED: 2026-05-16 12:10:11
LAST_TX: 2026-05-16 12:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x2d8b8832). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 9302… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3c763a44452236fdf0ae68927700410ee8ede50c 0xf3a793883b9091c652d5dd181d037fbd68b2c5c1 0x7ccc952675b742fbe0ecb6f1cc0cd2858efabc9e 0x7f8ef60e8cbb97e06a457a6e05da83a4c05d34e8 0x35a74ad6958ebbca35a0b10746bc4c6e5cf8b059 0xf251d1d665229bd6a7045acbfbec132cd1934b06 0x347b5d24eb4c9cff29bf26c049973c0b595eb367 0x7b2d4142ee48b9ccd4c222cefb681ad4b71c3f2b 0x163fca13cf43450cacdfcd38c9122071eeee8efa 0x5422f51c2fc53a1f65bfc76a457c7eecf37fa8ff 0xc1875913cd4f85f64324b633c7fcb53f6a79067f 0x249188058fb13e75838788dac32fd1b02e1573ad 0xd56c29411c20db39ca4ccf98052256fce58cca31 0x419db3b755c4036babbc7dd5540d09c6a5c0a07d 0xe4513f12920f30f006f963fc78fdc49b3cb8a9dd 0x41ecf227a4ce2564e8fd1a01082cb56bb8e1344f 0xbea4f54d0e9994ee9f3893bea994b03c0c8c33b1 0xccd8f89fb0656723e1a514763b5763f292045159 0xd874a09dffdb34e62ba45ff590a89483314b125d 0x05d9553760f988d347dda009a45ae5c6d35c7545
发表回复