HOSTILE ACCESS DETECTED: Vulnerability Log 0xc3dcdfb76ee8575e923bef9240cf58a9a7a222e0: Production Debugging Detected
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6029EAE15399
|
Infrastructure Scan
ADDRESS: 0xc3dcdfb76ee8575e923bef9240cf58a9a7a222e0
DEPLOYED: 2026-04-26 10:28:11
LAST_TX: 2026-04-30 18:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 38 segments of contract data. [SCAN] Detecting compiler version: v0.8.70. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0x0f. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x56b8fa76e48014420133ef7e074a773363b5bd3e 0x9c268e9627e904bd20f06ca4e076ec324ae8a0a3 0x8e1f3d8453575e5e744c3aab3aa8005f9981f81b 0x3900d03f7ac33fb99fe30c439898d5730a02d1a0 0x1128d2108446881f929884c7c105962b1c39992c 0xaaeaa8d67564b1859602a91964dd260aacc08140 0x04ce522548e2ba87e4c778103e961c6d444561fd 0x5b0005d28d437c8052c7b7d5cf41c0051898e3e9 0xe29c582fdefe674e05c7458001ed2786af4fa30c 0xabe1e1549451b097f46c4fc09e49af6336336ca0 0x0e6fe36915b4d6b0f00ee707cde1586785cfea8e 0x27442bce55c5c66461b2577cdd97212a1bd7af72 0x66cf83878968f6cd11334752368242b71aa35e46 0x08d4674a4d0ff216b7f7dc50592486cf7f4d9e65 0x7bb14454700462e80893308eb0506fd1c89ef4a8 0x2eb6e69864fead8bad80f4f096cff1b419647de0 0xa99bc076db5d58c901a7476ee9720326abb9ca94 0x935b4e88b198db6f28705bffb33fc00298c2baa1 0x0168015cbaceeaaa30e675e58b71a226043e5a89 0xa36e80a6328d4c04e38aebceb7e5aa631c9f83f8