26 Abr HOSTILE ACCESS DETECTED: Vulnerability Log 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53: Production Debugging Detected
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC1A3952600D
|
Infrastructure Scan
ADDRESS: 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53
DEPLOYED: 2026-04-22 21:02:11
LAST_TX: 2026-04-26 11:08:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 86ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x12. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x425a27e51b45a438e8ccacbc6462ca41e77b1c79be821023234f82e0b46004cb. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x279a316bf75b08d634ee36279dd29bc284c88d84 0x7ad662e91eb1214a0efe521aa80ca995766aa81f 0x0c0c2510bae687746a54fa4039cd1ecdc18df7ab 0x444d4a44d3c9da9390e661c1870351f3bb369060 0x00b8eb83b1f499507becac17f2bc8a3aa94055ec 0x3bc80523e71c67c8d5a17d4af364c21a54b9bd79 0xbe311561534a8ca2c2aaab4b653311651a5ca305 0xcc11292547deb66edd68054b8571acead7cee349 0x908e0d198125f67d1941995bb343ca9a78f11d4c 0x83145de286a43968c38a8b8e0c3790edd0b6faec 0x2b12bad12d2e181f49ca156615589b08d61e28ab 0xbb8c34c6915309a51c20c1d7055b09887f960848 0x5e0127daa49b880404486a8fb9e1c726e61af95f 0x23809c0fc8b38205795fe265b9e3582ec97cb50c 0x3587e7c625fc451e1d324eddb2cb9431ef793492 0x8ee52f60ab1dbeca88ba729bf260538ffe588f8a 0xa88054ab5d81774624be571b8e4f3c46e38f7fd3 0xf9320671ecd645dabd6af6b7a41f4ba24205ae9d 0xc875b5805bcbb32036c7036b7e947784f43d4b16 0x8a28d2f9d3c0ec53b45854e8d486e7d25d67b8e1