ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A3A6EFED3F32
|
Infrastructure Scan
ADDRESS: 0x0777221a9d58b72f8f4c7fed0af3a22354aa3032
DEPLOYED: 2026-04-29 15:43:23
LAST_TX: 2026-04-29 16:04:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x0777221a9d58b72f8f4c7fed0af3a22354aa3032… [FETCH] Hex dump completed. Entropy: 9.59 bit/byte. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 84 iterations. [TRACE] Bytecode segment 0x39 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: a94ecc9f297941ebd895a777b1b12ee64d6a8feb4d1b52dfb6c5d76bf75f1d11.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a95de1cd113b5e87843d70f8b0ff176231b5048 0xc5d7323dfcda2c30a76c373ae48aed5b77754ab7 0xdea02e638eed30bad417298dcf7354973dd1225b 0x7cb2b1d087451e3554fc7dbb8c1d9e58368d7f48 0x9843be7a2ea97aff0e7bd12751033bbb259446b2 0xbf356e0fda3d190698492e9351f304e5f28150f4 0x38e37b2cea4f8696e4643b480e5e8689f27d4978 0x14eab8e496a92c3f091629fbd7a58c9cc0a47265 0x7aa917d1801cfeff8be2ae80ab36cd00d07826b4 0x6b6fffe6843aa00442d34378d3910bb3f2f87a83 0xbad5e589613b3c96e0d24845c89bc1d212b285c9 0xd9de4360cea889aec8c3e5cc3ef35de5ad37d10b 0xe2118b44abf4e92e46885a908cd027d3e90cf5b5 0x533a35cc200633dcaa7c186247ed1da209171861 0x82921efe632ea06f57d2e5cb156c90c8865ddcf9 0x5aecb995018fadbf06b1120869378f6b49e040d6 0xd3c760a78e28e49667de95b7bb08b8ac0c6dd254 0xf75f69e5b6d0b4d052eb207a7b7ddc1d52b0c80e 0x23095fd549430c8706f739aee356264ba0942fee 0x4ab7fbcd6b347681a3ff682561fc78b72e0c68af
Dejar una respuesta