ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-573E81594B9A
|
Infrastructure Scan
ADDRESS: 0x4c279c3d5da8929f5e155b73d7832444164e3b98
DEPLOYED: 2026-04-28 16:56:59
LAST_TX: 2026-04-28 17:20:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x4c279c3d5da8929f5e155b73d7832444164e3b98… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 3 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x2bbcff11deeb1cf923ed8b39794d5dac20db4617. [TRACE] Program Counter (PC) synchronized at 8098. [VALID] Gas optimization score: 47/100. [DONE] Scan task ECFA82A2 finished in 96s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x975b90c9a0a8809ba7604a45b13643e1a6f7d412 0x5890aed58d7976bae8cdb79c809db18e546be882 0xa32b8577838acbefe71071fc7f3a2017d823f429 0xe42b8c6b05a7be0bb1dbf47c402eefe06256ff06 0xfdd528a76fb7a8f2ca60a23d5c6be4b18b279e8f 0xac6ac76b2087de574bfdc9d8e320082f403effc6 0xd1573c10538a30629517624cbe3ba70f07a1ed75 0x3d12252a45fcf76dacf8b8b0ed8ce8bb901f2292 0xadaa1716ed9c3ec26b6ef203147e238cdbfc61d5 0x5cb2dc6ba0880c309bbadf99091a6437bcf52fee 0xe229962a65d57244c12db32fcdf2efeeb10710f6 0xd9b2d491a5a479a7db355f10927bc1f7af3e5e8b 0x9c80317a537cfb526074206597258f010ab607e9 0x230e8a6aafe93b8b20814d4257716e0e01cf82c6 0x830e598236b86bb6d80f4424d88b733dc160c45f 0x1fae86ae0f46f4f05e193245eb863055d61f6531 0x64ecb16e0de01dea5b73b9453a5892176f79b889 0xcb073168031d02ab8767e0dbba7ba1368d788630 0xcdf2bb228b12fa5097a19fe11d621db80ce56ab7 0x27df2abfe2f6d1bd52f5b832203a71a9b11e5fc1
Deja una respuesta