IMMEDIATE THREAT LOG: Critical Log: 0x7a30cfcf269940169028c65d3c9e198abd7ba8a6 Production-Stage Debugging Active
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FE0666CA02BB
|
Infrastructure Scan
ADDRESS: 0x7a30cfcf269940169028c65d3c9e198abd7ba8a6
DEPLOYED: 2026-04-28 17:02:47
LAST_TX: 2026-05-05 00:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xbc9b. [SCAN] Identifying function signatures (0x3512700e). [MEM] Allocating stack frame for EVM simulation… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Gas used: 94293 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-F370B7C5.log. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4df28456f6914375f5e52b711870fcdbfcf983dd 0x39b4222cdb464526ee1ccf45a14a74ca77c6ba51 0xc731ed030fcacb1830c5c280815dfa7f72402067 0x73df03cc96493f53aed5140c0221b40fae6a6e0e 0xe00afcabf07585708c3cddbd58bbf2d34f220b5a 0xb322dfdaa083625b8c4c1f9db2f7776a645b42de 0xa875d136ea2c26f0438a4c91c5519d3ad3eca99b 0xe617631ec7ff345170815e90fb7bf6306870cba8 0x487d35ebb15a78f2751b74387aa6b912965510e8 0xc02c7ee11748acbf90676fa01a076aa09ada0287 0x463e8315e5fe01daa2a433a911ff0cec4294be0c 0x64a811bd0e91cf00d9ce0769eda028026577a6d9 0xc44d33391ee799dbe3bb339348ebd76653648ebd 0x89e3e9f28bb7d552d97c3522fdac650ab2d0dbd9 0xadedd1dc63b326b0181ae8d03e203ae8e93c80a3 0x472146f9f512dbabd032ccb33a911ec812498e26 0xca28783b651630abfa125d8f80223b8d71bb3e30 0x3683004e5b642459a0efd16c72666cc882c679e8 0x9d3e63532d5d4672605d071aae78d74f7e931bcb 0x3c772c0c83f68061d5133e0b9d5891dc020e69bb