RESIDUAL CODE RISK: Code Analysis 0x43a488315ad6d670a360d27d68e71f39f6a06ca7: Residual Post-Deploy Debugging
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E74B73BBC5FA
|
Infrastructure Scan
ADDRESS: 0x43a488315ad6d670a360d27d68e71f39f6a06ca7
DEPLOYED: 2026-05-13 20:34:11
LAST_TX: 2026-05-13 22:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x43a488315ad6d670a360d27d68e71f39f6a06ca7… [FETCH] Received 22 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 94. [SIM] State change detected in slot 0xf2. [TRACE] Call sequence: 554e -> f308 -> a2ce. [VALID] Consensus reached on node cluster: 6/10. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xce94909a15d80918f30a8e1d87f51bc1cf9bd801 0xd244f1d8ad8a8d917cec69cea2aa5213d7c5c82b 0x4a406d050f8d7a7414ccbba21e94f4c21f4068c9 0x7a5b8c545321ff1797b934729e2d78707ba11253 0x6a9e53496512b7807dc5c68ce102d04edb1685b0 0xc6cd15f29a7b4088b6e3285530e98ffa049b7ce7 0x2c90211afe877eaf388b9776dd555abd57435ecd 0xf54d8393354571727a115ed5d345076adfa5b262 0xc21e4ceed892d7d7890f59dba5572a0b2f65fbb6 0xd6ba31e34506ed904e80c8d05a84cedd20ce1b16 0x29766be840e4dfe0507b5aef73671a617ebc7b12 0x68f9089b93f6ed04b2edb243bfbd8810088e62de 0x7e882473419370646f6a718a2e96e92e53f85bcd 0x073a96533741d0cbe4db2af6cba236423db281c2 0xc36e928c4af933b0e961c09edae63e6ddb42104b 0x72e23ee877014cd4a59d5d2a933c65a4c0e83dc1 0x05e8b3cadc40766a86ce6fa627f983bdb4ad8741 0xab2e76589d9bbe4aaeb7d0f062b9d17a9a8d84f5 0x68004ee68bcda286804bfb6ca4291e3c74fef823 0x67b2972f0947d434f0f3b166c8384f2c8e4b0816