IMPROPER ACCESS LOG: Audit Log 0x0fe29b700c1e07e141052698c179f1d954bedd51: Improper Debug-Mode Deactivation
0:00
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DB39840A31C6
|
Infrastructure Scan
ADDRESS: 0x0fe29b700c1e07e141052698c179f1d954bedd51
DEPLOYED: 2026-04-27 17:03:23
LAST_TX: 2026-04-27 17:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 40 segments of contract data. [SCAN] Detecting compiler version: v0.8.14. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xfb4d97bf5570d8ef1de9d591cee2df145335202d. [TRACE] Program Counter (PC) synchronized at 4401. [VALID] Signature verification: 0x86187bdeb44d0352a30e02281ca42cf1ba23688f220df5cd3a284ae0af170aef. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x99eeabf21b1f117712683b4eb17a2ce197f796e6 0xee2b371f7ff3c8d96cba0cb56a37f6e379ed1ed7 0xa615d9d24f49261195c0073273e3e8e38532301a 0x3827b7b107f3537f676ed3dd5d70246297261353 0x5e2d13bab15c35d5e4ff8f0f3c10351f5bf10878 0x6ae5f3343017b36a0c5e6c197409aafb94b7f794 0x0fc12bc6b4cf63d53bbaff7a5db047e4a7a9b67a 0xfb0ec4e050be71f5b9d111befbe73199e292e916 0x2edba81b40a05b952d88e725d07edfc08e13e395 0x38a4f6aac44157c586133d97b6e38813dfd32efd 0x2c2fbb3c4fa14765d86b861fa80a724b4ea7b65d 0x7e03beac7ec1b910f4029e5fd44b3895ddb221b2 0x47d56320e1b24ef42253a3744035257897297bb7 0x5be66ed44fe98d7b71bee8f6302b16e7852d393a 0x13414325c7121cac08698ccfb08bf8179c958c44 0xab3b92e318f5288ad77fcbaacc342479600e3074 0xd370a49f5922151d63543a675b99fbe9a092ee28 0xde8cc54ce7f607fa9116d6ff2a2bef84a671a66c 0x131b59cc1ed72ae24030feb53d7157e2dc77db7b 0x74c254004853d4f98a20427f7f8a70bbb97e411f
Post Views: 6