الفئة
تاريخ النشر
07/05/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F196FC36D4BA
|
Infrastructure Scan
ADDRESS: 0x83f3853708cf613f3de4dfbdc5efe2bdc1a134a2
DEPLOYED: 2026-05-01 18:18:23
LAST_TX: 2026-05-07 19:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): e651c746…55fd95f5… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xca120484d164e676a47a52dd33ecfbb110999c7c. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Gas optimization score: 51/100. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x93275f4e81a77cb828634d67ba0897eba6a3b09a 0xf7d40f3cc68c0cec105605458307ecdadb3cf4ab 0x0bb8282f9ef33a641b676eb7ef95d95a87b59469 0x10ed36a1e9d8d992e96fd77d15e6a38ace70b723 0x10bdf47479a0b9aefb4b2e8660be8f9281b14310 0x79ac1573c60cdb8e23909c2ec269679e19d49ebd 0xf8df9396d5b41ea3119a358f6d9532cdd79bf0e1 0xdb20f867b1bc837a2e53585c3fc03c67b4404eb0 0x848e43b7c2c7ee2eed2ebbf3ba607bcb14f45eba 0x775ce701535306904bca1aba9fa5658eae9f65a8 0x88045a301d5e096e321eac6cc59c1698ad4d8b59 0x6e2a96a033835bd04d1d1d1b23b598b4628b0e98 0x2e15230cedab8d2b93743a14c3e4280c387968e0 0x869a1255d33beff7e9f3af1a9ad6749bec8c7e58 0xe97f5cbe8bee6521d7f86f7ce4894bc5944c3e1d 0xf4842825db4ae6b5649a16730856389346ac2085 0xbcf39b15490f193a63ed13adb88083dbf0b9517e 0xe119246941347f6478587e6594c830c096374faf 0xa4af47069a11bf7783376f7a834d21b7c3e67d88 0x246203fa76400a52f874e2dd1f41ddd3b49f60b3
