30 Abr SURVEILLANCE TRIGGERED: 0x0de8dea19d881eba264d45f0c3ccfe3df8eb5658 :: Operational Security: Trace-Log Interface Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FDFC837BC0C6
|
Infrastructure Scan
ADDRESS: 0x0de8dea19d881eba264d45f0c3ccfe3df8eb5658
DEPLOYED: 2026-04-24 11:56:23
LAST_TX: 2026-04-30 20:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 9.56 ETH. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’08e2d768…2fadbde0′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a9b28455eac61ac8034f4c4fe03c88d912bbf45 0xee7ee93589673e3bbc00674052b7b670cbd6eb51 0x2bbb3c9eb405b90f7aa11eb82e58283c5adaba27 0x3cf25d36c117c61ab6b1d53918393da1e9172107 0x3358d8449231e4ca75e1c39d9445fb90aa77ad21 0x3150a59ce6311309ee6db0a2859ef87dc3b51493 0x305031494368a9944444a44dc7c2e542a6e6884e 0xe240d946340eb999aa0625db31c0f4191876e7e6 0x48057285546c5c693f5da4ef150ceaa706e0a129 0x9c6ac6c37cb7b620b5c0d75d0baeba00f3a02f31 0xb17f96ea8d9457dc702884c3e40c6acbf74d2af4 0xf4ec6f8b5ecb9b74566124408aea512ad90e88f6 0xa335d02bc8ca648270a1c0a9676103976ff82562 0x7ef81c3002cc7e46a807cf1ac7a2b3939e7299c8 0x9f6bb80d625025c81c661564f5080b3ff0a21166 0x4e91e25fe2ca5aaeafb683c1ac2e8b9028c7706d 0x375da7794c02a6e897acbceadbb160ef6de41352 0xa94ee01965072e8b37c7b2a695a00e7d34804089 0xdd83b40c1577cb49a0dad12897bd289a3effadf5 0xd9619a1264415cb3ddeaf521bff1b470011e73a1