ACCESS VIOLATION: Audit Summary 0xcb65f5667be84ff76b1a83b205ade8c2c5487d5d: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-347A72A37A8A
|
Infrastructure Scan
ADDRESS: 0xcb65f5667be84ff76b1a83b205ade8c2c5487d5d
DEPLOYED: 2026-05-02 05:16:35
LAST_TX: 2026-05-02 05:54:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 54ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 8.95 bit/byte. [SCAN] Detecting compiler version: v0.8.53. [MEM] Virtual memory mapped: 0x0000 -> 0x1fef. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 1747. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8ee518cae6c6cb7cb1b3166a66479b19c1032bb7 0xd8bf70c778a210db910ff88f1a7811cc973536e8 0xc632e33f5f73e78397753a78504e75cbd5972b95 0x76f94ff7501d0d2ab5cfe896abdc6071b485ddfe 0xaa8ceee481e212b98a07ec62fcc56fc34570c404 0x236ad74c614d77de6d01fa658013764191bec5c7 0xbe9c082ec423918c3f50743d6435207c295c0c12 0x46058c6f93abc74163d88339c088813ff6f1a9d6 0x33b62792ecd76a0b2cbdaaf8b985225ae6651e00 0xf222feec7391448e95c1b393bc4b1a4c33773546 0x6f23ddd90dd81b17055dc0177ddd2c9dd281e412 0xdcce66095ff9497e4b74cd02b512ea73ffd045e2 0xf3472aff9b8f1f355bbe927a7b22d966c004f089 0xb1f84f8a40e45c76c9f6a27431d0b070da491c2f 0x8611d8db32fbe0c127c09ab56f42e2da9ad8aa42 0xc73c45b17a8020d0d2428eb047407e521afb98ce 0x1290f8d03e07427e30fd582c45d4f34b560d8e3b 0x87c09cec3c3ddd5bd6f79e819a4fd905c2da34d8 0x035693207fb473358b41a81ff09445db1f3889d1 0x0b6ba110a1fb98ee0167775a6d72a2d05d971447

Leave a Reply