INTERNAL PORT EXPOSED: 0x22d11c8daa0b4639cb93b8ce4de6978bbcc70184 :: Risk Assessment: Exposed Internal Debug Ports
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-17CF631282D8
|
Infrastructure Scan
ADDRESS: 0x22d11c8daa0b4639cb93b8ce4de6978bbcc70184
DEPLOYED: 2026-04-26 16:37:23
LAST_TX: 2026-04-29 10:29:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xd301. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: f0b1 -> 208b -> 46ce. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’75EFF8DC’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4909e18e775c9c150e381be14a3d3459fc689356 0xf176937b84bd2644350e56d4b3a46230b83cec6b 0x151c79502d66241bcea72d3597623810259f8b15 0x7a523252e155c331397b05c71c3152e7d2a0e007 0x8711033a57a3035bed2fb6a243e1f1f7f9f8f31f 0x043095050e53fbf94c904538dbf2b1b4234c8668 0x674f93beb60be98a5918e02a94f72b8ff55acdd6 0x3cf39b509458e713b49e5198533f28759abdafae 0x6175fc9a18fbe2154eed2ae7ab113181afd3544c 0x7a878e2d6c0a2bd1ce31f9885d6de934ac7c55a4 0x36b8ad3994dcc54321906938473191eb475b9be3 0xe82d09bdb33ad258e81e1b2c89cdebb0324c7c34 0xd8c1cf19efb8593989ff9266655faaec5ab6ed4f 0xeffe78cadf167d736361a4f9a5240b53342b0634 0x046070c2915cc9508968821ae6c7653de1927936 0xb0a0b58faa539b3c35dbedc3f4b6475e865c86e7 0x59e6e27a34b5282390d9d1ee293b3233f241ce39 0x328f117c00df10189217462e9979c9c563b8c39a 0xa81098dc3eb7a45345f3af664fdd7600fcee8f8e 0x14fa6a802003b37bb01c9c6b6d6ded1d942aac4f