0x5bb61d43e6579b0b3edca61f130ae12e3d2c4b93 :: Operational Audit: Debugging Flag Persistence
Rédigé le
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ECCAE1A66764
|
Infrastructure Scan
ADDRESS: 0x5bb61d43e6579b0b3edca61f130ae12e3d2c4b93
DEPLOYED: 2026-04-21 18:24:59
LAST_TX: 2026-04-24 03:06:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0xe058. [SCAN] Analyzing visibility: 3 public, 2 private methods. [MEM] Stack depth: 8 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdab8aaaeb7b34aeacb302cd5fd9fd0bc30fe82b1 0x96d05ec88d8c40887427079936c74de32864bca8 0x897ad784a29387f20ac67d274a21e90012b1a397 0x7b1ba55831826196f915f9ea07c2104e9ac3a17f 0x3987f4d99fe9baac2ee51ba59e8a0b17e283368b 0x5a293cf5925c073074318949c0b457e395a43981 0x9b57c18fcba0a5751596875ea9ae54a28e612e25 0x53866484bbf54903ac49ad2436427e0a358088c8 0xd1b50918aa2e34b89a89b23c84d2377f1622d0f6 0x3ec30edeb6c3e2adc85d6837a2fb1855abf82674 0x788d4dc49c99d67b092e0c4abfddc33c3d8e20c3 0xfc0392b14d9416a045d8c47af195b32000c67424 0x6423fe9d3a658bbcf45527d8412bfcb8a9695014 0xcb376efddd4c63fc74082f1a9926d076d12fb56f 0x6c1f4f4313a13ea1a72e1f0aa6ea5a638b983b0e 0x08cd8701d2dd1989faff0a62fe3b64d1f9cb0b0f 0x3b9dfa1bbc240b91a089ba8f7d2ab5c4eca18acc 0xd44135adbf353161b84a7f4d3fc3e3a81fba1808 0xbff563dd3193aa47a6305a0a25c5abd4695492a5 0x92176a04aa5bddd21671bf7d97f56cbd9b1db0d4
