الفئة
تاريخ النشر
26/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AB1A1B0E0CD1
|
Infrastructure Scan
ADDRESS: 0xd77dbd15dc0dac524e7c8ba0f490e47328750c66
DEPLOYED: 2026-04-21 20:20:47
LAST_TX: 2026-04-26 11:23:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xa1bc5ebe successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x02245506d7ecfff8a81f0456eb74f81118ea60ef. [TRACE] Program Counter (PC) synchronized at 5321. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe7351b596660bdbd19ef744d558c782b881f707c 0xcae12f88bd22c476a635cde9dd8efedb60326488 0xc44ee1834fc58baa67be86d4fe9d04330a9e7751 0x412f650b2423b072a5723447a8b2fb48088983bb 0x3541d047f2fc46d630c6130990341f80b02a7ec1 0xc0727b432594418a28e5280e9ddb56eaf85d5fd9 0x2cc1e456cd29b88a18972064339ec77568b8bca8 0x33042e7d5db64fd04a6915ae6bb6c5e350aa1a3b 0x2e07a8da9292bcc8d1e9a0262f33fba04471f3e1 0xb7744534b28f96c3a62986c2b7d30ebbf2d161b9 0x0ba7b07b0e6f915f54a969878c82dad9edde9ba8 0xfa9103da2cdc76d38ad55c89aeb522aef61a4161 0xb62237d18fc518f38927af08c0ae7cac58c50a74 0x2e93eed829b7f24ed97ae191990235d65ccd7fd3 0x43280300bacffb0a174d82438c9b59cf85daa783 0xd6a26a7dc6ede4a72b29e2e06d53f466494399c6 0xfd74d207125fad4ab76243159c6f809744c834bc 0x6fc54309f99bf379dcdcbe20ffb7cf35baf433d5 0x0694e3ca47d4679de16962123a33f6799b6f08b1 0xf8cffb63b17107621df3646dacd8a8f9e61b35ce
