URGENT SECURITY STATUS: 0x33dd02dbf4441551d81149a0523cc509eb032397 :: Security Status: Debugging Interface Alert
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-68BC21104EA4
|
Infrastructure Scan
ADDRESS: 0x33dd02dbf4441551d81149a0523cc509eb032397
DEPLOYED: 2026-05-08 12:44:11
LAST_TX: 2026-05-09 16:17:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 69. [FETCH] Metadata hash (IPFS): 01b09553…4823ec12… [SCAN] Detecting compiler version: v0.8.55. [MEM] Tracking pointer 0xc5e3deef in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 1731… [TRACE] Debug: 1fe5962b223a8cea. [VALID] Consensus reached on node cluster: 5/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x89d04560a3fc9480d4237b92bfb8563f86d67e58 0xe240e15aaa3ccf054dabb600aef8e48a25932a80 0x96cd93779e8bb4708b9ae27537f0bfea92e68dfd 0xd26b5fb0ef0908ad274a4ec1a4925b45e99b0722 0xcc85db0085fa0c5219fa2a5a4761bba02db3312e 0x94937e8e7bab158a63d9a9cb182ae5ed2410a077 0xe9762a3a1bf798cb9151945384f1e582d0613439 0x8a5de08df310c7a20fca1eb7f7231d14ec1a3447 0xbb741a796ca2d7cf6fc32c2078352f647b261368 0x09f53bc5a643e6eebc0c41a3ffd64ee6b9cd690c 0xb0640e8c0e62f250972e52e56e764f13e922b163 0x6fc878c79ba49300724e9e1f3c3db3bb2d74f94b 0x3aea6d1895443e8dfe948f79d166d1170d5eb584 0x7ff6b077d81017f362e822f0736c1b144e9283b3 0x0a8018917f4767dc871f2eb1bb8ef2ca2a3cd5e2 0x7e0276195d8559ad135867ca02be60b00ff47ed3 0x093c99c3b59897b989b229e2e9c6b2e0a6e9810f 0x28f7a77e6883c9e352efd13afd6f85689ea49517 0x9cddc8e501787d501b8c96b6e3b45fc380322497 0x798ceb003ca334ae8b2bfb6ea7232b066d928d87



