ACCESS VIOLATION: Audit Summary 0xb5d7a3b3d3a4ebc2ec021056fd495c897ff077c4: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0E7880CD2515
|
Infrastructure Scan
ADDRESS: 0xb5d7a3b3d3a4ebc2ec021056fd495c897ff077c4
DEPLOYED: 2026-05-11 21:55:35
LAST_TX: 2026-05-13 08:00:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Analyzing visibility: 6 public, 8 private methods. [MEM] Tracking pointer 0x1801f60c in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 2830… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0xb5d7a3b3d3a4ebc2ec021056fd495c897ff077c4. $line = str_replace(‘E63F3F7F’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2b1095e557d9e548e84b65c6236d1ed3a8ffed60 0xa52dc9876ab4a9db6dafbb83410554086054d140 0x6434861ca3d199215bfc2be9d563316c267b1041 0x940624939bf06626da3b37f9480404969db29016 0xa321ce7ad11efa22ba0bc36c0ac39d8b8d5a9e41 0x0602826cc188433a1f44683331ce198256fe5869 0x9229db9df332c9c0866a149b56ed9f65e8b70792 0x09efda1c980ff1e5a272fde1ffb868fec2a89553 0xcfb85206eab68c25596625bbd4c870ea90bccc02 0x40691d6aae8780825641e59d9a6f9d4c2c7b3ac7 0x1061f35c2c94ca5539edf1830da5daf060435aac 0xc4e203dd5c29d3725ba8ffefc939c0274eab5025 0xac129d3510830ab94fb2347f903bb6e364718339 0x3ad99b7d83bd9e3969b692bd3df32c915df0fe77 0x6e0b9926e1951502aa857a1c7356b476a226b440 0x81af5f4a474a28124072979a31161bba8a3638d4 0xc9e3d30979813317d5213d5dd4ca2f5fb9e0d242 0xe5f62951e743b483461183a2c690ce76138ebcad 0x77bd2315441d7229d3837810ebe5e2127848bd99 0x3cf5b362fc6b665655c9a107764860f472ccf6e8
