NETWORK PENETRATION: 0x6d550d55653a98e5fb5489f2396a54be9023aad5 :: Network Audit: Debugging Entry-Point Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-64226A5BF7CC
|
Infrastructure Scan
ADDRESS: 0x6d550d55653a98e5fb5489f2396a54be9023aad5
DEPLOYED: 2026-04-26 14:32:59
LAST_TX: 2026-04-29 00:05:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 6371 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-7EB60916.log. [VALID] No critical memory leaks during simulation. [DONE] Log signature: f69187fe698a8c5560a173d5659e095a223a1509ddf527c07a2861a626b48e19.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe374f1c39b090fa96c7e57fb401a91a269b65c89 0x1c41c568a3294a8f14c7ded1ef0338a5beb843f1 0xca2f5e927d9b6d610592e9c9d1d4348174f83d24 0x309083b16dc58d9ef04291555a635545cee70fe3 0x7bbbc7e1a7c060df604a87a21c1f035433c9c0f3 0x99a71f719f189b2c2fd05901403f8baea28da034 0x10f6a376880ea6c91a47a1682a443a40c08118d1 0x453037144a14333f16e00f4443c6c709870fef31 0x116309b64decba3c85fbd3a0a76eb8fc35d2be88 0x4f155035a60a7f3e502319420df9df169fea98d6 0x7d3a77d1688f195768006e57a3dbfba5d61b77c6 0x93c95dfe6af0e39de743810f1dd94b6c292273c5 0x9e7b9f6560e16b37d38a5a9eb8a55412988a132b 0x99882ed2dbbd8ce9a88f5942ecb2a9170c414326 0xc1a7ff845e172650bb938f0e9c14cb4b673e4ca8 0x69860438a87c555849a69b134c631f848da9b00e 0xf58163ff379afb8072674d73c114743705f71128 0x3c0802b17aa278c1964b171f546bee450aacb65e 0x3b36aac99a453aa99e5bad66b136cfa23b60eb23 0x7fee227956cc39d1e9c5f066f442aca21f95dcaf