LOGIC DISCOVERY ALERT: Technical Discovery 0xd1b829408379cafabbd4eabe9ec0f1f637e2ad21: Exposed Debugging Logic
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3114A760A5AB
|
Infrastructure Scan
ADDRESS: 0xd1b829408379cafabbd4eabe9ec0f1f637e2ad21
DEPLOYED: 2026-05-05 02:33:23
LAST_TX: 2026-05-12 01:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xd981. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Reverting transaction at PC: 3691… [TRACE] Return data: 0x5296be21… [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x460dfdcaf4b1345c9d78049ec7c2041a43d8d050 0xed38b4da9e6ea4b05599a0d47983dc993e2f0b10 0xda8ecd06686632dad76e55e9d0ed50259f5fc3ae 0x8541827e2deddbf33722870f54a789c40c62deaf 0x736b21169eef827b4dc481fc72292f877aed4cde 0x04d698035a1b34e0cf3835aa2cfedbc6361b3f7a 0x5fb7518e0da792feda4a0c2317e85224138502da 0x3fe2af1df2191bc40b0f415cc74af60f6d18e07b 0xd634d89caae561811fd6326e628a405d6dd72a61 0x02b8eed4c69c78c2ffb1aacb1ae71de44bb77289 0x0a01fbf6c343a61f1959437ed4d5733bf0135178 0xff0e885f30ae54873a0d42decc3fa112292c7c88 0x329f66d9846a1a00ada226b2b266b13a30cead24 0x7f947627245981b1cbbe0a09ce6b4b2c462547d6 0x9d8adce2ae684d6c38784035969e3a1e93c01a0a 0x7f1750a1dbbcb958f812cded8e9f5a5e69c7a9a0 0x859da3447362c899e7a0a619dcb04389b4fd7d8f 0x3f7986b146380b445d9f66c398a7d2fd66a64b35 0x049f1d1e6557947be9b5836e6e139163006c2669 0x599b423829e9810e719604588991c6f249fc68de
