ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-11323D9D7E24
|
Infrastructure Scan
ADDRESS: 0xd95888a281f50adebfffd1d8d324b6949071341c
DEPLOYED: 2026-05-03 01:54:47
LAST_TX: 2026-05-03 02:12:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 50. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x4f73. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x7d. [TRACE] Execution path: 39% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 070da1375806fa3fe574d719d31e5459677bfdf3da6ff791133b198b2afd0e55.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x85abd997df998df17580a6be85e957decb582aeb 0xe3596ead541a94009bc77afb0a0e45b81230bfe6 0xce881af29f527571c3c2d5c955542371ee71418f 0x2be5e5d45b55b1e753c54ffc5f05d425af32e5c6 0xd783708ec8e0cc9b646d256f5845bd510f19c859 0x2196b3f31a43de49a2951c514488a8dd7c96ad67 0x9e4e12996e7e482d3b24eeb701d4fdf5e3005b67 0xf4792774a13253651352267c188ad98d718ec151 0x88fa30f482b334361bf1dc37a1022ea3e59b582b 0x4c8cb3c585c73f10399b18154cb2234a5448cb14 0xf5f4d36f053c1245856914489b7798683337e50b 0xd7a0b0932a533944c59d6fffd48428d10518764c 0x34e9bf0ee93472897380ef20a3362e6bd7f05762 0x21fdfd016dc692b4fed953576c5788ffa5d5977e 0xc7d4397203facd4426dfc8ed384a49584757f875 0xd0708454c75253dc9454b25dc190e433ef24e1c8 0xf0ff302ff0b2153855645d67529400a4646bc1f1 0xf0a6d016755d76e41605f94a88bbb10d6e303b63 0xf286a492dbc2ae8faec34c9f46291f5bb32f7cfd 0x5bdb969f0a4c4430c3b2d32a412ba2df463adf88

Commentaires récents