ACCESS VIOLATION: Audit Summary 0xa791f3b78c63d0f609595fdf630ab6e5254425d4: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D76521EEDF72
|
Infrastructure Scan
ADDRESS: 0xa791f3b78c63d0f609595fdf630ab6e5254425d4
DEPLOYED: 2026-05-05 16:58:23
LAST_TX: 2026-05-05 17:11:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: AFB7B450. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 63 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Gas used: 43567 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘AFB7B450’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa3228d6bf80e874178f9696924ef242e62f2fdaa 0x19bfd61c945cc61468bbc3ae4cd69a282a4e4ed4 0x399492509f5b503947999389c8e221629ee5747e 0x0c6f8a4cbf778233727574c7a2f405f79c6f01c4 0x8634b5dec376d532d18d1bc9017961157a0ecaaf 0x0aac0927da3adc168a67ca392c0b954739ce0694 0x320e76dc8dacaa202ffdf4807abdff8d136f0d97 0xcc6545792e07016bda9b10577fc4c03c8c984730 0x0abf49e56c50932705dd175dea4283a84f736e5c 0x38889dafcc5c8ce8f62522e650cb76d958bca912 0x4ba89f154b31b6c45918c49f06a3d0e49012a32c 0xd609fc50f6c0f027a5ff8517805f7a31c634fe05 0x9d2f2fc8e554772c66ea57be78db0ebeb1d76983 0xd4c6841d1f8a2a677ceba36d24d67408bd2a1cd7 0x09adeb29ca431fa897415bd0cff8534e1bd156ce 0xddae67b061d66051818783d4965900416a193c3b 0xe1c3169708f7fd909adbd5c4780f5815cd8202ed 0x3a86e053a86eeb6179a880f1478399dd9369a3ba 0xe8807f708b87096bad30ed508fb9975c0b24d8b3 0x5066497f42d7e46114f3ead606ae322dd61601b0
admin
0