SYSTEM OVERRIDE DETECTED: 0x7e16a2c80f3046f6ac8f9709920c61969fe2b19e Technical Audit: Non-Deactivated Debugging Gateways Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D9EBC10557E9
|
Infrastructure Scan
ADDRESS: 0x7e16a2c80f3046f6ac8f9709920c61969fe2b19e
DEPLOYED: 2026-04-29 06:23:35
LAST_TX: 2026-04-29 18:44:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Synchronizing with block height 78277. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 9 public, 7 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x006b3ce91ee333825c0bc1b9d8b89fc1b4fdb948. [TRACE] Program Counter (PC) synchronized at 2544. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9f6bb80d625025c81c661564f5080b3ff0a21166 0x1c0d205925dd6b2445ce01ee48cb216a14c7dec3 0xeb47e2fb1e89b1ae028df84b0d77016fd64fdfbe 0x1ae7db7e940ee1999c51be2ca501b0ea1ec0f0a2 0x140d06e0e031995b842c0c14b21d9ae8bb035577 0x318c740e77c9b70b37b344ef94a2bd2c1507ed43 0x8c21bad7679718bfb91aa8636a94436b77b66a91 0xe38e2e3b4d9aef4556e62e4d2b1e6fc155bcc985 0x137db60726db3033288fb4560713fd4cdf2f1e32 0xaa7d6b805bdff8305aa2b003e9d82f33c3608b33 0x63acbdc55557db2b015812f0bab8508e85dcc8a7 0x251542843c6cf120b189def46bcd4c7a6654966f 0x467d105da88cf0b2ac19492b975888a538a24fbb 0x3f49681d83d07e4adc900045a8a9f980fd5f5329 0xb50cdd763fea9e5faa7fa8a49c69f8cfa995b1e8 0xab20f915b7e4c87c6f0da71d67670be33f5af8c8 0x9640c8dd3b96fc35e08ddeba4d04637ba096c426 0x24f47e686a708df9615fa06138e9a81edf650ad3 0xdf1659824c524ffaa9e3fbe0566b66d362c7648b 0x9dcd7e8e791f9d96fba79c8c10f3bc31cfc24d7e