Abr 30, 2026
- Post by drluis
- Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D8302809A3D
|
Infrastructure Scan
ADDRESS: 0x5923873c729c875ab1f3cf404b6c23723076e4db
DEPLOYED: 2026-04-24 09:58:59
LAST_TX: 2026-04-30 21:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x87b2. [SCAN] Identifying function signatures (0xf7d3bcdb). [MEM] Virtual memory mapped: 0x0000 -> 0xfb40. [VULN] Warning: IS_DEBUG_MODE found in storage slot 54. [SIM] Balance check: 3.60 ETH. [TRACE] Bytecode segment 0x5e analysed. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 32b1e46f333ea6c2a5fa38fe6b284c5f83f2a11e131e44cd3bd7580cdd9bfec5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xacd7e235faa428e0a23a76432a96171bb7995218 0x5847560b06425ebea497a61c04f01282b8234ac8 0x92b869cab4d478da653f7f9278abdf0cbf19d1df 0x34ed38230ba1d5e794e0a47a0711e89f1faca40d 0xa31b3e71e4266ac50da2820f4692157fc8b97098 0xe3f8a907ef2e72d6e9e45ad875f84d36de2db05c 0x3d96e9fe1f34151ccac94a028dacca9f5941192c 0x3b960684ad3bcf94c1044b1e56361b84aac1315d 0x8a6449f98cd50c18852e5ac4e3137924c8306e95 0xcece550b4db17dffad10036a75c479a2a77ff539 0x55a3658b0e763403456b753d8bf9257489514e62 0x194eadc8d9e902f18b0c70e12008330a11ae5a6b 0x2e8f3903dc4e4d7230201ccda94284ee2a4a68a7 0xd2f2103d99c43da035acdc0c37b9c87920f9f2ef 0xed14f55a65f2d7462ab1148cf81c36c6d14d91a3 0xe5513b22b9e740d81d3b71139708573539c1ef88 0x76d1b5bb4cceab3409b792794ad401d69fc1d488 0x73c74c3240c5a29280928bb3ebb2f81fcda573f7 0x9f8605f4f75a6745d24186942d360b4f29a7974c 0x11190d64f225ba4257ea97524e1730b105ec217c