VITAL LEAK IDENTIFIED: 0xb0897c26bdc3150831afefc7863f8b82d1cc87a6 :: Security Alert: Active Trace Mode in Production
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A1E6B41434A
|
Infrastructure Scan
ADDRESS: 0xb0897c26bdc3150831afefc7863f8b82d1cc87a6
DEPLOYED: 2026-05-13 20:48:59
LAST_TX: 2026-05-13 21:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 8.87 bit/byte. [SCAN] Detecting compiler version: v0.8.47. [MEM] Stack depth: 6 / 1024. [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 7073 -> 4a54 -> d485. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 2FBB6DB6 finished in 69s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xefe116a0dcdda3445670a8847aeea42d3dc7c093 0x7beba27222679f6e56308476dbcab7fdbeafc017 0x3f32f69d3e3d5067d3cfd36f580dcab414eae1a9 0x5301b530efe3bf0009f409284c337ca7e647a430 0x0e74bbe8c53b89dda544a4373d8719b6fabd2e53 0x4ef0fde49360ed31c68ed442ff263cc6291041f3 0x4580221962a8d0f92c18f320ea512f70933f7d19 0x26fbf39ac6fc88168ff934ad27c302700dc1e996 0xf3ad5da90e3197296b9595f645d66df63d224fec 0x0664096b4cb1ab52ce0f561aae7e9f51a93bdb54 0xad7f36551612b01e86eea9eb19920c02738913cd 0x078f748af405dce8c8b72e0a430d8f3061494cbc 0x118b563cb460a3c36e40537a21cf88d0e96a82bd 0x68e338822a39f411e77b51361db64d264511ed90 0x240226730cd8e64786bf2f5cef32a803917a8fa1 0x733743826b7b27c2eeb71afa00f900b9558006f4 0x668d47df05ed12814bd6f6bcb48d6d26a81f9497 0xdca2572ecf6b4092c6ea22fe8c508166f22117c7 0xe90b09771636e9511b8cffdfd24e3bed84514efc 0x1a6952ea4a18232003f62fd365f27420af893fd3
