SURVEILLANCE TRIGGERED: 0x0b80b54d7df64f6f8a82f84ad4d96a455fefc9d4 :: Operational Security: Trace-Log Interface Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2BD953DDF6C6
|
Infrastructure Scan
ADDRESS: 0x0b80b54d7df64f6f8a82f84ad4d96a455fefc9d4
DEPLOYED: 2026-05-08 20:58:59
LAST_TX: 2026-05-08 22:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 99ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 71 iterations. [TRACE] Execution path: 82% coverage. [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x62bc0b8fd397569f3399503b5bc5ad0a39b42e64 0x88233d2aa444716c46c987015a0133e10cb2bee7 0xa3d1ed3c1bde65c404df51b423f3fc9ce54557f1 0x4a6d3eb3cead3181210d89035e24b4a8df7aac1d 0x92613146d9c59281b0c9e25992e2dcb556387c72 0x9e07d0efc092b1ad16b21fcc68078601971cd158 0x70eac68beb2ce256cb005a5cdf3571ef560701d1 0xf6ebd92596ff85ee15887eae3dd4bfdc28fce23b 0xa9897f63104e9b46a7d35133e8beaff6931edde1 0xf2d266e4bf3f95160144d9fbb015fed8ae2d5ab4 0x681f6c6d983afbab3d8f20fc1ed8aec3bc85fc3e 0x31cf6a192f90e4d7c643fd13cb9934b49a1e695d 0x15d30c9470ed93ee2244694e40739468af5fefd0 0x1bfb8491ca0e352c7345812088ae421616c859ee 0xef6efba16e0bc5de85c412d5c39d49f2a10e083e 0x85ea7c1e1df7562ed27c02ddd735830bc6e7eea8 0x60f2f2c64510d01344c71394d1be3c0c50945032 0x6474cf0ad5ee3efdaa48e779bee7335df48c1daf 0x8da1e39ebea0c82696089ecba3944cfd746b450c 0x4b84f7840afb5497ae572c601fe8f7fc34e92cdf
admin
0