02 Mai DATA SYPHON ACTIVE: 0xf4d1aa60bb06a72caa220be762796ce5fd572373 :: Trace Log Exposure and Unsecured Debugging Entry Point
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-62F3F8B58A66
|
Infrastructure Scan
ADDRESS: 0xf4d1aa60bb06a72caa220be762796ce5fd572373
DEPLOYED: 2026-05-01 23:49:11
LAST_TX: 2026-05-02 00:37:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 1065 bytes. [SCAN] Identifying function signatures (0x4a739938). [MEM] Garbage collector: 0.20ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘877678bc96ca2ba71dbcd480f9441960a550ae7092224a3b44c6d77de867fb48’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc367b3bbed376ededcec94865393ebe192e440a5 0x31172b1d93ed2c6281598bb661a7c1ea5053f667 0x160bcf6a0f1b467a862e26a1d21b669213f9c753 0xb5080543b0823c89577703c42125d5b74874148a 0x9e83f7591ceea86f55c415449fbd511ade02924a 0x130b27ed2bb8d761f3e82d650cac01a1597c3063 0xc4c26d9e1e5fa8df9b642c65215df3021498b324 0x279b2b57aa06fcab8b68ac04e57df2d3e46d2ede 0x26577b0e0fef6c5ab2cd5ee52f70bc0193f03500 0x68366dceed75f2e58d29e656c2239d1fcbda3f1f 0x9772794000927785437ee512d8d8064e6df4243d 0xfc414a0b34f951d7a2670677ba842103920b3601 0x34ac55a83020481fd8d80c946b6344b73b7e099e 0x4d768487f9782fa4e18d5d6cde435930a116c082 0x0a3e6d0191302fed0aff0668bf0aba529de4a833 0xf0ee34a8eca7d7fc0a6649fe673b8b7ef671b63d 0x4b7c74427c8e63de8d54b09039b9fc9c4c14df75 0x13e6c9a47cc71ae54610ec22db6154ac4fb3b50f 0xae180d3580b1c4c5020fcb8b1b2c633b2bf8d54a 0x53b02867a0d27e975fcbe1a32f6d9ec3533fb373