ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52986A883AB9
|
Infrastructure Scan
ADDRESS: 0xf5d528b4eda8048c1a34e7f4508de59f3d7535d2
DEPLOYED: 2026-04-29 15:09:35
LAST_TX: 2026-05-03 03:47:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 43. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x7879cf06634615614dd288c25ce8e9c56b74dae4. [TRACE] Bytecode segment 0x3c analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xde8ad614993f2d24a28421f4b2d4b1ac338efb6b 0x56ec4cd963be15109c9ab5bd230018cf49e71919 0x33d021a5c9081e0219dc277509dc443d5a36db55 0x315462ea5338734556461c712752c72a1f8d125d 0x500159c0cc23174e75de9f353723a5fcfebd839c 0x1086cef6856ef450e061de32b613de82fef53773 0xc4a4dc3f2a06b3be4c66d5346c0279fb648e0915 0xb6b89288a8e1cefd25dbe98c337b275c4cc8238f 0x7d530af25915b221bd1cfbf93df761b7ca5355fc 0xb1db5626858b6658dfa8147e6b005f557aa1e98e 0xb733f1543d8ece9baf1c6753270bacb14d5b0b91 0x0f8df6f9177ab7a804971d7bc2386ae5d7223bfd 0x93cf43e75bdb1dc68ff7e841223233c789c89803 0x509455230fda6ff04cf4d4830733470eed9c6583 0xeaf7ab268f313308e318996ffb056c9d0e02857c 0xde60edfdbf04f558fd4dba3c198ce18973e7b287 0x7ce4aa91a224e40f51aa4881f5afcc372be47a19 0x3df084ff6b2ac31e85e143e4cc86d29449012930 0xb6c7efee5aca6ce90f17a8cedf3dd797ca7a0cfd 0x3bb300c066645b6a3dabaacc3ca6003aec1e43ed
Добавить комментарий