CORE STABILITY RISK: 0x05a7599bdbb5024fe82f265510dde032de86bd41 :: Core Analysis: Debug Mode Flag Persistence
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7497E7E76C2A
|
Infrastructure Scan
ADDRESS: 0x05a7599bdbb5024fe82f265510dde032de86bd41
DEPLOYED: 2026-04-27 15:12:23
LAST_TX: 2026-04-27 16:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x7f4e. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0xd5. [TRACE] Return data: 0x162745f6… [VALID] Consensus reached on node cluster: 5/10. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2a87589983cf4a2df0b87a0114e31616aca99835 0x798c456a9887b1e92825633f940fdcb4d60534f8 0x14eacc6c280bf993e2dcfb8810331c329cc10991 0x9fe07e96939efc1a1f7a9feb5d1c6ffd730eeb4d 0xb6b9c1c2aed2e9b257ff70cee89176248db67413 0xe13314d914fff00f2d1ae0c3b7718d8861841735 0x9d1f0f86e06f087e302e888adbc9b07bfed0a25f 0xd691e49201ee8e3562c491e9105faf375be0fc5b 0x97228ef2121f3ae116eb43887e714d107b6a2fc8 0x68493bac3931b8b235ae0cc1267295bf0c888409 0x138303f0c118c3c240bac04617dac6fe891678db 0xbfc4ff484e74bf10f8ebbf679bf9426e31d47f5c 0x9b212bce6e76c74ccc7f24e5bb1bb8a85e5d03b5 0xbd066b1498423a6b19f9099d0cdf051bd89cc1fb 0x478a1a96cdd7d81684ee7e31a85c8020dddd9143 0x2036c37087be266fc6f1d9841e2a1202f550c1b2 0xb8f919b15ce526139e68e67b2a465606c6a0c416 0x27c37578e102323c9a9d9d4bd39b6bfcabd3b9bc 0xce3d087d53bdd3330d8f68393d4f1e83544fdfad 0x6ff5b769d83471e6c3f36be9d1df036c3fc0b7bf