06 Mai VULNERABILITY TRACE: Vulnerability Trace 0xf714223bfd2bad25bb4014d57606ee8e9bcc4df4: Internal Debugging Gate
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F2333D49A919
|
Infrastructure Scan
ADDRESS: 0xf714223bfd2bad25bb4014d57606ee8e9bcc4df4
DEPLOYED: 2026-05-06 13:26:59
LAST_TX: 2026-05-06 20:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 1670 bytes. [SCAN] Detecting compiler version: v0.8.75. [MEM] Virtual memory mapped: 0x0000 -> 0xb686. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x99. [TRACE] Stack trace saved to /logs/TRD-EAC68E75.log. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf5aa0b16cb257ab9eea94ac84beea121ed3a2628 0xbb5d2f107a20b2b5d7558d38bbe31c7870c357ee 0xac54b43e4409a2422df56a69a5a7dd2bbfbdb8c8 0xdc9c71d2bf4f616d86d2a3909073fdb02147da47 0xa6f933c652ae49e359000e087212d1464aba172c 0xc78ed83d81814335ca7ac85c7fc4f39d3c9b1891 0xb8dfed447b2a97659fcd63a280c957fcacc4fad4 0x5394c5de6984863164efec7015ec002c44787c55 0xeee7039194b2ac5b5e0a4e0ec89c96e5381ebbbf 0x2536b5d3c4f0cfc3e5af01fbcee6686b2a5c00a6 0xa04956389247836bcb331bd6ef70f20284a1984b 0xbe3fd1447c7b6087b49fd9b9681f3180280ee80a 0xcf434527aefbc808e3e3400ab489a0e25c4af4ca 0xd29287d7f9b8937f1c3683c9a6499fd64589467b 0x905738875751a027c0a22427f5d892af927f68bb 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0xcbf529b9cc942dc7ca028490d73b1a804c4dadbf 0x02b210eeaa2176b7b43751aa9c236143a1355cdc 0xbd3d1f16a38ea3d9ad980eec49f329234701ed7f 0x228067972c708ba4e7a486ca5a28a95d9f83532a