ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1143204244E4
|
Infrastructure Scan
ADDRESS: 0x50cf994037c3f79fca70c23678b4c288c5e57efc
DEPLOYED: 2026-05-11 17:30:59
LAST_TX: 2026-05-11 17:56:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-E6B0BAB2.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbc9249561165dc3fc490f19a86d6fbeb3abdb76a 0xca91860afecade16a2aee8825c6f8def3f9fcc6d 0xdbcb016d9d23a1805924b4c9d96281f86e69021d 0x9f0ae265d33324ab63a1d7340b13c2081be52448 0x6b197f2b01d560b74c8a4a9ba4958a3992e743e6 0xea7b51079825be27e5fe1da149439dc98d31b8ac 0xdf71da3f2f01a250b523158e5b63b4556c4f30ac 0xee046214759b58bb0eb10d760448e2783de8a546 0x1bf315bb4814f067408764e0172eceb6f34ee5af 0x63132bd00f73a42e83f1394c2b27e49097865dc2 0xe0d132965ae9d2fad0736ea471ca6d0da0afebb0 0x2b4496d1ed7367c7c6e830bdfbed25f7c8fa0122 0xa993e7c9efd119030117de548402a2cd73646bc4 0x4c73856887e30c9c0568810ae0bcb92460676328 0xf1b33daaae6f7a5267a9326c2f383774ea6001d5 0x062294aac0db4b24b216e7067628186763087b92 0xdb88dbd97c6c6d0becd3e1e14933f7ee90650343 0x3eac5d5322c72222b64227fac7173f34184d9be8 0x249451341d9245f9c675a1d63a8c927d82def533 0x953652d71d1f6c38feb81a5674a14ac5d6c80315
Deja una respuesta