VULNERABILITY TRACE: Vulnerability Trace 0x59e00ae5e1e03093ec0434183262803bce363315: Internal Debugging Gate
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D3F2895D024A
|
Infrastructure Scan
ADDRESS: 0x59e00ae5e1e03093ec0434183262803bce363315
DEPLOYED: 2026-05-17 09:35:11
LAST_TX: 2026-05-17 10:12:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Connection established. Peer count: 77. [FETCH] Hex dump completed. Entropy: 8.61 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Stack depth: 7 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0xc7 analysed. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0613c4d0de69f16e3746f9204643acdbe905c78c 0x26d1ec523c699d8c9a46177507f1fb165c9d0890 0x1fc7d9eda0256fba8e25f3f9c07aaad7fa5cb4b8 0x483a92ece66b857835216a44644bd28a2cfe7e4e 0x81f78e06592812dd31078b3316ad4f2ccd2a8ea1 0x02b846285c17c069a05f8eab77a427d7250a398a 0x6dffdf4decf0e1519c2529b88a43a37f6fd753c8 0x5b95ee32471c7ac801b80be0ea0980082f4bc058 0xe269bf1ed76dc52e00333fff3c1c75cf31fd7aa7 0x1b5daa64ee789f15f150385677c7cd7b21ad4125 0x5e3449a31d24aced8716b873481a3e29b6956ca4 0xdea0b824d417a33e587e70c141a9ddeda4f54cc1 0x87e696170ecb4e2fa5ed28728cee024755ce9d8d 0x1026a5a3683ecd28ab013294f3c00f1c89767e9b 0xd98e323d691d3719fc5cb9d4e20783e767dee6e0 0xb0cf7a7e4efa6a9b8ab86f38c1c5de90d5397337 0x87aafd0872717e5d0963deffa9bd2087ecd2094e 0xabe3b86390cb8c0b9fb02d13ad5ae404d640d19a 0x0263c26b3f7d60804cf998b083efd225f1406ce7 0x02adc08a8e7dd597835a4103c013abf393c3820c