SECURITY SNAPSHOT FAIL: 0x7a62c8c23a517d24e4dbfdc9ebdb84055348ec88 :: Security Snapshot: Active Debugging Protocol
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7FE79A616349
|
Infrastructure Scan
ADDRESS: 0x7a62c8c23a517d24e4dbfdc9ebdb84055348ec88
DEPLOYED: 2026-05-13 01:42:47
LAST_TX: 2026-05-13 17:53:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x450d0613 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 91 iterations. [TRACE] Call sequence: 8c37 -> 0edf -> c859. [VALID] Gas optimization score: 42/100. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8a1d3df2c27c025a98988ffbec8760eb1538201d 0xf2804be6f29b37e96474c3f2931fff8d204ad564 0xb1d67c580e96bd856ba60e285e25e81b28ac7339 0xf99a021c109ae34757ebf693b1eb38e86b5a4169 0xc2636e4574e293da69844c36ce6aecd383275ef9 0xbffd3bbc7bf8b5324f1e2f5482c9fb1143accd52 0x735293f06ce710c3c7d353a266e6509b214d6460 0x53d84882df417829feed7cd07d6b012c879a36ae 0xf2e7b849204350dc6a11dd0a723101f53ad42f8c 0xc3ff9f4988532e47f5ad86ceb5e6aeb4d0a785ac 0xd6838f20602a1dee85b460a7155e39bae010872e 0xed1feca965649db5d57385562c99963a58b0c2df 0x52c1696503e0524ecb58df2949bc76a002e7d59d 0x8502af3e93172a1461d3e02ebb3b7bac91ad8be8 0xf0fd48ea6277dcc5526c80ea241703114633f7b7 0xb783830ef5d89235ca157d46ba1fa0115a457a81 0x84eadce7c08788b041351bbac9781d8e820ea96a 0x54245fd3d26e493cab86250c700f78b18bb5b68b 0xaa939f9e2ed4c23e7ce7790bee923e5d2a7c2ab4 0xc175d35e6a508564aaca424293e094b2ca45fa71