01 May INFRASTRUCTURE ALERT: Infrastructure Alert 0x5aa4742fd137660238f465ba12c2c0220a256203: Debugging Mode Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-22E536A81D72
|
Infrastructure Scan
ADDRESS: 0x5aa4742fd137660238f465ba12c2c0220a256203
DEPLOYED: 2026-05-01 13:51:11
LAST_TX: 2026-05-01 17:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 36 segments of contract data. [SCAN] Analyzing visibility: 6 public, 6 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x1bba. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 3.95 ETH. [TRACE] Execution path: 37% coverage. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfbe6d712247dfc9a28e6993542c042b151015496 0x9dca4074d595de4bd227579565eeb44c3addb8b7 0xfe435d702815855935717baf0aae03394bee0b59 0x6d51a467b3533d27e302c7660482078ae211ce29 0xe624fc9147d86ff70abfa69c1a19b1fb805a5494 0x33016bf8b93d7bb7bb8094876bdea24bbf26a3ae 0x9d27f5fb45d78e726caeb61a34a7e6d8b27cd8c8 0x151f57b06f7bcb24631950369883af98664d79f6 0x0f680f0f678a4e0361254e1b182929c3b09944b2 0xe8d22e961fd03809be91a1e80945280a389ebdc4 0x4a5398c8f132dffc46279c3f0f5945428318516c 0x3acd7b89ea20c0d4613454109ed731fc64816aad 0x8bb885f46fa90c937abcc302f07559db30a9f183 0xf4f49700f1130a1d0ba9915dd551a610b832555a 0xdf08abb485598940335643fc92af20e4d8fc1223 0x2eaf0fbbb33a2b57f7fefbd3e984ba19949edf39 0x4932d8026243499d3908d09d3731897ad9118f45 0x20fb3d5285c17d2fdb1b1546171f7a36dbd2f131 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0x632fa82ab559bf4bc7ea3ce71bbb343e7e4ce851
No Comments