ACCESS VIOLATION: Audit Summary 0x3d1668e23b2583c4f16d74903d501dc577a4aa7a: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A04B1C1DEC5
|
Infrastructure Scan
ADDRESS: 0x3d1668e23b2583c4f16d74903d501dc577a4aa7a
DEPLOYED: 2026-05-13 10:29:59
LAST_TX: 2026-05-13 11:32:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 56817. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.29ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x57 analysed. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x889055ef415aad49a554a0491fc9421d2b31dd9a 0x53cb05533a6e894ef9b91c92f9ba0c6dcb38caca 0x803e07cc18576507024e309d626f512659caf912 0x9c213cf6c5ede00b83c9d4c0b3a24eddc39074d2 0xdde901ae44db278860697bfdb1c9a41d207799d6 0x081df1e11a492f61dccaa607d24d206c77c88195 0x8c85918c9c4156adf4272bbd95969c51232a54db 0xf66d572b28784425160ba4defb4b63cbea7bed87 0xff21ddab0e21d5f7ace741a360eca64005bc65ea 0x88442d71b34b47d38a5e2d8c44c9151a9c38cec2 0x2b62a7c54c44bc967bdc741be15eb3691315e034 0x4ef0fde49360ed31c68ed442ff263cc6291041f3 0x40da8af8d466b88ffdd2a4fd5bf2b263c6d91dbd 0x0251f89649d4bb10fc17b8eae740a20c603e8437 0x76181063723031bc58219d67018e53f68f9d8268 0x88d268370a0bdd862bdc023171663fd76414f02e 0x76614dc462252f18595ac588bf298198cee678ec 0xe0ffe9d221db48b3736ad8a746f285c6f6f90101 0xceafcb61e0bef8dc37d0891ba1b25eaa6d49797c 0x4cf26a7e680d5d86232f985b91c6cb9e0774b89d