发布日期
24/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4055586A28D0
|
Infrastructure Scan
ADDRESS: 0x032719058ce7a13aad7b8ec6fe530abd03f429e4
DEPLOYED: 2026-04-24 03:36:47
LAST_TX: 2026-04-24 12:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 9978 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 19. [SIM] Mocking MSG.SENDER as 0x4fa5736524971fbcf718d8a410963153d6cc2436. [TRACE] Stack trace saved to /logs/TRD-3DF1C82C.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa4c5e118b6db2ab6709c85832379edc69bba01a9 0x7650fdd6e7e6990e7558f496362fe499e574c476 0xdbbdedba83c93f6aa9b79da59369e4c18e5a6e16 0xacc66dc8f8995eede812a55e49c8ed2747a3a2dd 0x3f39aaf00430be0eb1e720b86805eb927107d958 0xb1375b5dca0eed11e534466af7f8ae26f600ed70 0x396602719dd0c6dfc1cda76d7e468b92d3423167 0x3a284627cc19b39a039cc891fd5d1385465aaabd 0x867c4a1634d0809c2dcdd4c254edbed2ef7bc727 0xabe317e84e7389855657d0d02daa168e02a7c323 0x0a2c84d7696da6c1020648a9bb957f6cd103098d 0xca25a07738baa1686a35658b63cb074d264eaffa 0x15ef518990a991b5d8ebab8373d9a285891de72a 0x8abbc77aeb115e74e91102437655359ae0602fda 0x7136fa089601205428dfc18edb5a6766d5973bea 0xe48778ecece7f46d9ed582a0927e4b3051e02911 0xfd73fc8bb55f357de40ce30c33af4a81119c94d9 0xe64902cb18bb176e944709886d6eabce272372ea 0x60d51c492a8bd3de27ac236ce0a68e6603f46d1c 0x3ee628e2d576454e0b927adcd53cb47919b5db24
