HOSTILE ACCESS DETECTED: Vulnerability Log 0x1cc582dcc47ff84bad0461c55966858e96623c66: Production Debugging Detected
Rédigé le
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD03F6CEB35B
|
Infrastructure Scan
ADDRESS: 0x1cc582dcc47ff84bad0461c55966858e96623c66
DEPLOYED: 2026-04-26 09:26:47
LAST_TX: 2026-04-30 15:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 3 public, 9 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x75. [TRACE] Debug: b25d7d0f8048f7fc. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x381533e6b95671382d9181dc521069f91eeb54dc 0xbc99e7531b093ba5ea2373954695a360da3d4393 0x725303087e16776002f1218fb42b3527775d460f 0x9e333cd07f24edfb1cbecf1b73547e537b460536 0x385d7f9c5e673b36043c2fb4a71cfd6671ff3f99 0x1c46e225b19fc46eca9858d67a92f13390953f96 0xca20b592b00eaa3d4aa11b769c7cd851ca305d9b 0x111f68aace531dab30d9a78e73aa48e80493a708 0x2e1f12422e35e0faebfbf5285f39cebe06ae3838 0xc603c9f12c1ce01a254d5ed632ecaeb06cb46979 0x2df810b35e5aaaf87690909666535533392c041d 0x81137341418a43c6414b3f0d24d7978fb963a32e 0xebab5f27b47758edea325ebdb8505703e51c6a25 0xfe17566a940ea41c885a1ae320974caffee64d62 0x377e52bff82e563b37b7ca63383e18dfe4995741 0x87bffc3d6b0042ba2eb454a7ca4b6a74334f17da 0x2420aedf30b70fc4112fb6bd4f3aa228567e984f 0xc2eea9f73efa1fe4bedf366e7a67bcb2e4bcac4c 0x061b598ad6c9a746936380c6c468cc15131c85e2 0x44341a31feb92f0f4f98416ba18131ecc05c2863
