HOSTILE ACCESS DETECTED: Vulnerability Log 0x1ffd48f510ee54f13eede629de9c5b8caac54b37: Production Debugging Detected
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7686CBB51A9C
|
Infrastructure Scan
ADDRESS: 0x1ffd48f510ee54f13eede629de9c5b8caac54b37
DEPLOYED: 2026-04-28 23:12:47
LAST_TX: 2026-05-05 19:15:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 40ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 4.48 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 71 iterations. [TRACE] Bytecode segment 0x82 analysed. [VALID] Gas optimization score: 14/100. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcc753cd358ab8dece74ab1780593676a76c6008d 0x91b5c03b2d0a9eb90619aa898557e437a6fd2163 0xe51b3ca1913536a875e381bcb259e1a6bb4928d6 0x8840afba4057135218c42a26303cf503de213f88 0x945da0ef39a0c52b4a3172ad291f998e3671314d 0xed8a55b9f0ea58b57c2816989fc3935fe8240763 0x28b9f423d5fb57a0e9fe4a24fd53862600e5b987 0xdf7842727f31a502a359a4c9ebafdec5215b4e32 0x247e777443ef09c8417f0aaa61c237fdbe7aba96 0xf0a6d016755d76e41605f94a88bbb10d6e303b63 0xa67b0d5c199939aab99a3d0b2adb4267d6cc1985 0x609687d103cddbc23a79d4c2b5cd133a1716d557 0x1c577291ad75f0144365218b16bcce80debf20de 0x483a3526109e895815970636b8763f1951a3b006 0x8c20a4debba2a8d3450cc48cb3fd5a7947974507 0x361b02a31d4d211f8bf3efa9b9b5d14e4556c295 0x606e73c5e1e634bdfb0a3329086248785c3deb80 0x05f50a7b5acbf05bdf770eaf217e7c5b9d18fae8 0xb97dee102c26bfe2fcda43332e721ac5807d0fed 0xe77727a12b2a7d80ab4405cf06bbe0e58acca4b4