05 May ACCESS VIOLATION: Audit Summary 0x120a0b6d641743551d7623f0ca0b611653a86430: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD64726DD5ED
|
Infrastructure Scan
ADDRESS: 0x120a0b6d641743551d7623f0ca0b611653a86430
DEPLOYED: 2026-05-01 18:30:11
LAST_TX: 2026-05-05 12:39:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Latency: 89ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.65ms since last run. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x78a57f964e8e16b38c281cac69253249743231a7. [TRACE] Bytecode segment 0x52 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘4e5ea25e…2ece00f5’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x866ea784a23286edfae4df8378c1cf13918f3edc 0x9fea611ed8ed975209d192b6a17ab085e7b1ac29 0xa392288368a03fc0094256e9eecc8cc97524d77d 0x42d8a34379ac6fc92066729fc439ba9d14328dba 0x053ad49e518a0923cff6454a33e97a6c3e09615c 0x7d62604237b46569c9817e3044e8f67fd9128aff 0xd7c94987e877ede6b67e438dbb094f92a0b05057 0x4ff56bc6a3f3c09f5771ed21e7aa60d11f6ec048 0xcc6545792e07016bda9b10577fc4c03c8c984730 0x6455d666924e938c73aa4bb8afea0e46faa7cc0c 0x91ded83a949bc5b8b191cf3527f5434704a0e02d 0x180837a68bbe6afc17511d03970479504faf05bb 0x1851e4e4cef0f18bee94f7611e46132f0de6c9d2 0x69a7a2dfbbc7c2bc4cdcb5bb94e794357b4b2d2a 0xfc1f39c87bd74b13bbaab34e84b6ef4927afbc1d 0x9e22903e13c28f615940850432dcb518719329b4 0x5e631547a92d08937b2c580abe2ad2e686bbfb26 0x783b548ac5951851341a8ead83f810d0e53602a5 0xe959e7eca1afca6cf2bf8b07e25da355b6c8e8c7 0x34bb9911262416a01dbe3e68f746137c7d131341