PROTOCOL VIOLATION: 0xbce14836667cf99f57dba141d4aefcd8f635f041 :: Unauthorized Access Risk via Debug Protocol
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-856BEF74F95A
|
Infrastructure Scan
ADDRESS: 0xbce14836667cf99f57dba141d4aefcd8f635f041
DEPLOYED: 2026-05-13 23:51:35
LAST_TX: 2026-05-14 00:32:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-3. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 34 segments of contract data. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Clearing temporary registers for deep-trace… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 67 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0xa5d8d0bc121947b214dbfb979b90183d82db2f63’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab3f4744eeacb061b3c4acd38490fe14b617bdc2 0x195187a09977d3e5ff9cf119af00ca1b42333b8e 0xf92e4752355cc3d2435479f45bd90cffe27ed10f 0x4f0f20250c243b141148a89a33655e765605ab5e 0xfff6b4942e6d6fbe82b1cd14cf9d153af3c8e801 0x14715149c9ac772f2b08c6e0287b6ee6b32cdbf0 0xd714dc2491b1dc23c7bd81a83b28f674a81b712d 0xa01545d10f8450265b6ceb8133be60bb75473b56 0x39b3829f53b6142d3b27bdaf8bdb6979e87288c7 0x06253b99696e89a2cc909734ef06f0ea183ce5ab 0x87430a250fdcb294572fa4e384c940842a3b1277 0x333ca9cd071f1796253c83a9bbd2e0ab3ffd13b8 0x352226c419aec14746381583dcb46c6052478a8e 0xb89348ed102f4051c162df24748281c54014e34c 0x428295f64ae8ab43df4a82d7f24f49def34f3047 0x5585e72fc4c216da8d59abb8fb64dfb7bbd75fe6 0xc3c6489c6ba08f091fe217533661d6f3e8a95e41 0xeca67048328a5f78061488bcb5489bbf631263d8 0xe5f62951e743b483461183a2c690ce76138ebcad 0x557b65129e26c9ce949d5092d254239ced721bb7