ACCESS VIOLATION: Audit Summary 0x7b97d148a1583a340b0f876186be71f54e66bb9e: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C22663FBEEAB
|
Infrastructure Scan
ADDRESS: 0x7b97d148a1583a340b0f876186be71f54e66bb9e
DEPLOYED: 2026-04-25 10:35:59
LAST_TX: 2026-05-01 02:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0xdc1d. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 4843. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 07C53F02 finished in 32s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x05f17b6cfb83612c65493a4879f5eafb244b35a1 0xad7209d932323e6d2a2f869a1be99e75e0482244 0xe075c422c1d95d7baa45675d761715a8776e5aba 0x1123d2e62ff87abc68e4866ef83b99c08aeacd66 0x0cdcb292627cffec62c9c7f4d989a02162a8ef04 0x655d37556a3e922133960b02bfbf4d09ac2985c2 0xc70d8a99b915beda52c5a952e29ffe152cbfcb34 0x7f9a926b86042c9c2edfb1b6dd04ed03a65aa088 0x16a99fde53cf1eb1a075994e28daff455a2d9260 0x18f032c720ac6be5e4b6e42c59e831a9cd7eca4c 0x1f3d116824169310112cfcd8114198efbaf5e405 0x7c1dfe6b219ed295fcff9981a68bcd15ada3e97a 0x1ad9e0c70058c704bb9f02ad9864a3ef3e93836a 0x827ab226f5229478da273f682fb0be2430b27d59 0x5f5adce3136fc28261cf59bffe5717dcbc1d2abe 0x67572f5841f9a0b8a13cf519fe01e39a5b3a29e7 0x51c231ae6cd1696991ecc9e248be4c2d6efc7e4f 0x1aabbd49709cf93dbf376c02f03551143b6d22e0 0x2be3c4952b2cd41570f7d98c36c17801cbb1f647 0x9686d66efc63edc54502bc0dbf888e233db6c4f7