ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9F332C94C666
|
Infrastructure Scan
ADDRESS: 0xb45e359ba27f30381904587c880d127cf7365f1f
DEPLOYED: 2026-04-19 11:17:23
LAST_TX: 2026-04-26 07:43:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xb45e359ba27f30381904587c880d127cf7365f1f… [FETCH] Entry point found at offset 0x7f47. [SCAN] Identifying function signatures (0xab7425b1). [MEM] Virtual memory mapped: 0x0000 -> 0xd39b. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Verifying ‘require’ statements integrity. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x7ba3b8f941736ba47fc0ec76b2bb04096d85f75a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x55bbc432d72be3e9aed74bf107aa081f7fcbeb4a 0xd419c0459d50e56f6d7ca6ce2bb398d260ab4c75 0xb61ca663d438900d086359e0bb7aa4140091053c 0x327c7e88bbdeb825ab803898c5fde599e38977e0 0x089dddf302d85616cbb69a4eb81b748fdaed5083 0xbc65b586634db33083bc72f037de6a5876ad469a 0xd66b6c96971240a4c5b57d59d8ca6b31bab895c3 0x9b25dc74ce449e90fc1f6315955a0494e0bf04b5 0x46ac53f8a8dd32a36daa09fc355f66f8429c91d1 0xbf56b7cbd7e8f7bd040b0253b055e5a972a8ac20 0xdc11c0b8c21057a23f82b63cc4a8d975c083681e 0x802d7608ff255e90782bab4b56fca781c243c16a 0xca809764c5fe05d798d71a68d21109ad1771230e 0x5ab714582125a365f9a23fb30c95db0139d0a706 0x4e409d5f9867352555e99a50cee2c4a73364e5b6 0x6d63c94e038667e0cf5cad969336d7f9c588578d 0x16caa53515937d160332ae5081f27378f5b6b688 0xc01e4b239ea7cf7abab4a9ecbc03cc51a656c76f 0x2dc497263903c0f5d565659409780e8ee0095d16 0x6804847c1d2521f82f6dc28fee3e5f0f2deeedf0
답글 남기기