RESIDUAL CODE RISK: Code Analysis 0x6c492a2f65e1989e296ea868d13687aa146f66a1: Residual Post-Deploy Debugging
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-66F264149172
|
Infrastructure Scan
ADDRESS: 0x6c492a2f65e1989e296ea868d13687aa146f66a1
DEPLOYED: 2026-04-29 09:44:11
LAST_TX: 2026-05-05 01:14:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0xcef0b67d). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Balance check: 4.20 ETH. [TRACE] Call sequence: d149 -> e5c4 -> 7f81. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab75b6d233752b858c35ba479f15e91871656d82 0x976eced8388793d9170310ee19f4fa175f45cb0d 0x5684247ca31ecbec7f74f090fe1d424b1bf83d9e 0x77239654a8cb912e8e561298bb847483215d0584 0xda36aa38f3f4a04b78da4566e035ea0023ddbe6d 0xa235ed90a1f9173b3d9ef10d951e4ecf5b25281d 0x9bc503d0f1a8d540d7ebcc2c9ad6d81886cdb5d0 0xc2e4b8d8459f217759fd4b358dea61c1c76c0977 0x7b5258637b5e7f3e9c1a069b017d3d31125522ce 0xb01cf4630b10d5f0a593c630bb184ae5b497a509 0xfa158abc1e57d4f28124bd69253b5046603f3f98 0xc779ec03d2e6a31e309d27cdc0e000b4692eed18 0x305749853bc907abfa9d270517eb1fd7b16352db 0x1e7f4375c0fca9eef4a33085665263af7b89e243 0x61a52e7e9ecd6212d540e3c4fd77f71f39f556cd 0x211aeb14a1c38a599faf6de6ab45dbe2a8bee74a 0xfc05b888b19f1ccf8aa87ad8fc28a9d5643e65f8 0x29e75bb6a2e4896837f92b5cf77e8a1eb98ba8ea 0x3f1c38bd55c9cd0c16705347b8f4f43479613773 0xcd06d7e5d9736e6f5462b4850988a575303df904
