ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B69E263B18D0
|
Infrastructure Scan
ADDRESS: 0x59e00ae5e1e03093ec0434183262803bce363315
DEPLOYED: 2026-05-17 09:35:11
LAST_TX: 2026-05-17 15:39:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Bytecode size: 5044 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x75b1. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xb2 analysed. [VALID] Consensus reached on node cluster: 7/10. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x32030e40f117e4d4ed673049560665f094d721eb 0x42cbcd6bd27f2cb23399762edb69f764d65545b4 0x65f09c08fbbc15827798eaa48fe3f23f14417e08 0xeb9ba26125538dd7fda0a71f6ea2277505508d97 0x4b7b56044d6809dda85a076fdbf232bf9aff72e8 0x28488790e604cad1b48efeb62f88b5607e8d5509 0xc61352e142721f1f47c3b399bb40426bec52fa33 0xeef579f9742e329c3bbbe8ec74cb183fdffac011 0x9f211934893408d42be3963d8b6c94905a9def62 0x505d510ebec5e491a0295832fd9bbccdebc8fb9c 0xd5290ea5a24c1099dd483041e0a3d2b3eeb79bb5 0x26cecf4ed4a0ea7867d07271983939e20b907d91 0x66cb9878d8fe18be018d0045f84f27e7fd361076 0x981bccf195cc6611286cf288542f80c45ac5e479 0x82b198bc5e59665c814a47bceaada0349393b9cf 0xdbf0184e01557ca2708a0d7e72b063eb7ddc41ac 0xa63282842ffe8d321595d56903a474d163ffa400 0x17fc2795c9b0051ed6d6578e4243a8d5217f19ab 0x906111ff8f8507001c4636894eaca38133b3ef14 0xe1af139b76acf4bb0a35ab02c4df518fdfee704a
Để lại một bình luận