SECURITY LAYER VOID: Smart Analytics 0xf817fb032c1b4a15f8e8d08b516911747f032099: Debug-Layer Security Breach
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8825F8EB0E1C
|
Infrastructure Scan
ADDRESS: 0xf817fb032c1b4a15f8e8d08b516911747f032099
DEPLOYED: 2026-05-12 07:40:23
LAST_TX: 2026-05-12 08:40:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xf817fb032c1b4a15f8e8d08b516911747f032099… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 1 private methods. [MEM] Tracking pointer 0x83af6a3c in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x43 analysed. [VALID] Finalizing audit report for 0xf817fb032c1b4a15f8e8d08b516911747f032099. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa128e53189d51e85d3c369d2d9ee79b3a10822eb 0x230926cd244f07a1628be46ef188d350de5f3b6f 0x0f551cbd85815e315168592d0294e45ad8210ec6 0xbd92813b46f569fb854d93e8f18acc11e0a58bb3 0xab0614278ae505d92fbb19cee16df8c55dfd64d2 0xf97cc7a2c1935d8b4301ea13803d54ce42f79f03 0xa01545d10f8450265b6ceb8133be60bb75473b56 0x8986366102f96ecc37c5f0eb86b76ab5ccf07444 0xc402df71aa4eb7fc367716e443ad42b121c110cd 0xe66f2e67859bebf36356b57a1562a5c4a11eaf11 0x047b07986b7c816a3db153363c78b943c136c8de 0xfe9714d5f31bee635ae508a5c4ebfcba11dd561c 0x99936c48ba70848a25ac025c868b42deab0d6ae9 0x1a08fb2ba9fc0dda466ef8070724305e520fd8fe 0xdb3f7f9d85173063246e71f71797a6011dcf4556 0x8554d06c6dc83b5a612c3d2b5327abff727e815e 0x88de1b9bcf139bd3e69fe951b3b849832973a2e9 0xa8ef747dd2cb50b5f2d7a8ab52509af278ac2d3c 0xfe9c2c077d5d1c2e39156c071cbf1e803ba0fc0d 0xbcd043944dcef70b8475b197ac3e8d68be74d7bb
admin
0