ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-69BB432BB49B
Infrastructure Scan ADDRESS: 0x0fe29b700c1e07e141052698c179f1d954bedd51 DEPLOYED: 2026-04-27 17:03:23 LAST_TX: 2026-04-30 19:51:59 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: ROLE_HIJACKING_POSSIBILITY |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x32f6. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 2606… [TRACE] Call sequence: b157 -> 65b9 -> 8c8b. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 9FE88EA7 finished in 69s. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee606bdf08c64959f39c23a214485714ef94208d 0xd0708454c75253dc9454b25dc190e433ef24e1c8 0x5f853d757a968c82611beb56846ea52bdd82b231 0x2fcfc3f9a540c2689783186c0f45ceae240a4ab8 0x0ad843dab3cdb0dce46fdd8e40b5240a29c3a5bb 0xc89a7957f6aa55bdcd1814ea7932c1d6ff75016b 0xfbfb28991855e622f078a6b3fed83c043e248f0e 0x5c3bc1bdd0d2b57baf91091e53473bb5b16d7095 0x1f79a05eb25fc80689b9bf3e7c8b3ca75fb8794f 0x0aa5e57ff3906183405a0e46478361aed3ec8b14 0x16653babccfad0765398e120fc68d061a88d443e 0xb1111b5bc393adb7f1bf156d02b41f47a801e8d7 0x5a2ce62e46df64c2caabd952b67bf0294e87a1f6 0x39c22f36df9585071ef7763cfae360fedbd28f0c 0x9e1ac54d2005cef659d66d916971acf91944e92a 0xb93fbc467704efde61aa437ea31b629d2bcace3e 0x8f129570d6f928b28a31d31948454fc8be0d997d 0x4c1978d88b11c7bcf7924d2bc9cc1b542ddd2a49 0xf9376434027cd3d1c980cb468c7398e6b9879af6 0xe58a48a036318da4217a01faa439e39b46a99601
Свежие комментарии