ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F164F241F9CF
|
Infrastructure Scan
ADDRESS: 0xee7c657127285fa55dab19193907f8a4b6d80dec
DEPLOYED: 2026-05-02 04:52:11
LAST_TX: 2026-05-02 05:14:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
â OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xee7c657127285fa55dab19193907f8a4b6d80dec… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3da5123fe7cd6eae1715874a497a6fbecc6b5355 0xe9071ba286345ad9e49f5a3545b1528bd7f9a4c6 0x3f6d1d037e219cea46d1d63bd06cb07cc482288b 0xa4a6dc27827c0006252cd9448b6d590fbe08a1c9 0x0c3466d77c6c74fa90479e4ccc496f298ab8321d 0x873993f8f5f5ddbae0952e939ab3005af363af00 0xa80deb8f9e8e3b4780218d2e887b0246883c9b5e 0xd63cbd83233c5e499c47f527e576b9a56b7aa5b9 0x0878f97b92605b24e640a372e7ff309588846bfe 0x6482b389c56abeed5dbbbd2bcb3a115c267bf157 0x098410b612ffac4df3cc154e2012de12d19e5cc0 0xb6697c76853f888f4e9c3dbe5cc4902312bc6c95 0xc18f2a961ad72dfb0cd718015651a16f00aaef73 0x4294111ece50df12e8ef7233e187aa6508cc67c0 0x61c5eeda178417d019cc51208210c4165dc07db1 0x1ffd48f510ee54f13eede629de9c5b8caac54b37 0x56c76a1f72d7581741eda77bde4f7c4c4bbe8f06 0xe8a121ee55c0090e510ac4038c84b40b817fda6d 0x24c8abe45190f0398a30285ffd89c5ce762f6a17 0x450a428daab37aa6c492de565c41072e164fa3f7

Neueste Kommentare