HOSTILE ACCESS DETECTED: Vulnerability Log 0x5c662256f86584c716bfeb650066f33e4b9ca535: Production Debugging Detected
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-560471F4F3E6
|
Infrastructure Scan
ADDRESS: 0x5c662256f86584c716bfeb650066f33e4b9ca535
DEPLOYED: 2026-05-05 16:40:59
LAST_TX: 2026-05-05 17:11:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Synchronizing with block height 74903. [FETCH] Bytecode size: 9988 bytes. [SCAN] Detecting compiler version: v0.8.59. [MEM] Stack depth: 3 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x75. [TRACE] Return data: 0x855baa9c… [VALID] Consensus reached on node cluster: 4/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x23f63943940fae08566b67ebed98f7512278d7f8 0xb1db5626858b6658dfa8147e6b005f557aa1e98e 0xb2637c6d1a4f263fd812f5dfcd791a56b59daadf 0x3e8b101cda2ac33a9772c28b81f1697eeee24d25 0xd1f960d47b93419ca88b038680d0b8e03ccbeede 0x85e0746f914f5e22d29424e11c19bf0f60b69c35 0x99b7a3ae8296b959e2690105ef2a695927525b87 0x359e4923012db7af38766f0b20cf668e88d9391d 0x972d712ec863f4e071eb570c9be64069206d2aff 0x0beddabdae3b11359975e8fae0578b200e16c919 0xb9e41126f56768d02576c827a96489f36b186c77 0x721ac2bf14fb419f4b41e9ff9f5fa0a92b965cb9 0x8a5137b1f13880675a91508c01a4d3d1c53c8e1b 0x06412a437192daf43cc64df0cb0c7bf1a90a516a 0xe96462b2f7d50615da4ef25168908db4ecf09284 0x8bf58109c41b508df35ab31a3b780dfcda747460 0x0f1b78f540da06a3bb54e0446cb710c769703136 0x655bf13eb83edbe460dfdcf8ddec3c43183ee712 0x8f12a2390a38aaa22fc96ce32febe5c69d7928e9 0x4efc52056392573d8e9f1c17e15fda747814903f
Leave a Reply