ACCESS VIOLATION: Audit Summary 0xf8e9b6734c73a829e53b0bab060fd53c6ba08d87: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-48042CAE3B51
|
Infrastructure Scan
ADDRESS: 0xf8e9b6734c73a829e53b0bab060fd53c6ba08d87
DEPLOYED: 2026-05-16 23:26:35
LAST_TX: 2026-05-17 01:17:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 24ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 3656 bytes. [SCAN] Identifying function signatures (0x2377e0a5). [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Gas used: 15458 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 2394. [VALID] Data integrity: SHA256 verified. $line = str_replace(’75c7570fa552a761371af818492db67307ec465d059490968d5087190d485d96‘, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf938c7fa681a74f70baff24d72d806b2a58dfc03 0x2cab018048f76c487849e861efac1e4479b42665 0xedf99538d502c8b523ab03c632edf40c45d0d721 0xc6f839a4f0f6c63574f31f2fb561ab5f6ff10db7 0xb3ca31703a5460c107b282703080076b2d2b2d88 0x93377338d966164b667cde733ebbab056b9ab693 0x2b5a367ed463986d1fd24c9570efb4169a744c2c 0x5ea85b58c0626fdd2f91f3585d12bda9f11699c8 0xf1bb8267e8b5d6ce8cd82137b6f6e84f2415228e 0x89b551a70a2073538a3c6e90f3d7b5f68312fafe 0xb8de6471c7b3cdc20aaa84eaa3d5a337f66451cc 0x64f9efa06c4368c5427cf87a912f87edf4dd69cf 0x9d5eb6c1bb672536277f196cfc3e719629d51211 0x1710f6a39928fb5f8a74bc845a3195426cd0d267 0xf649e9734f44e70689787bc220881a3bc2bfda0e 0x29c1d3f93da0db5a0464cba36d1b569673dd0ed7 0x74c4e572b18d78d3b71f1cb907e78c5d54dfbb73 0xbe39b957b9841bda6bfd2ff1edb7c7c2e1aa81ec 0xa86f42f75e461d34c85ed5fd638a3cf31543b638 0x23abe847ef2182c7f237c307c720cbcd11299ab0
