EXTERNAL BREACH WARNING: 0x0fe29b700c1e07e141052698c179f1d954bedd51 :: External Access Warning: Debugging Port Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8ADCEAA2F000
|
Infrastructure Scan
ADDRESS: 0x0fe29b700c1e07e141052698c179f1d954bedd51
DEPLOYED: 2026-04-27 17:03:23
LAST_TX: 2026-04-30 19:51:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 68. [FETCH] Entry point found at offset 0x88e7. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 5 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 3.91 ETH. [TRACE] Bytecode segment 0x45 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x208909ebbe591e82d1ac4de741b0d222d637b243 0xb4de7507433c8c9109426d7467ad320563ae4a71 0xa5181b097764c3fc2b9d6789cb2faf863c7f4a87 0xec9e39629d81a0337f04c0876206ed671b72b82a 0x21bdce75878aabb157b01cfac597a3d6971c5150 0x22c04e726ee64d068ab502c77f2bfcf346a54fc7 0xf67c8314056c1a124ebee1ec798d4b9824e99b97 0x3f7182ed9ab40fbba43a53b9468cd3de2c0957c2 0x71c1b46c4287d85e61a1cfafc7ea3608f7495797 0x2843fb96b11c71a3118a732ef05e48cb40864351 0x94f6fc547193cc1286cb451cc9472b987ad2bf02 0x6e0eff303d503b6191bc7051dac4c490080ed57e 0xcc020dfe2b54ddd57567abb2b84d4386918a3056 0x2be3c4952b2cd41570f7d98c36c17801cbb1f647 0xc770356cdc74d92604cf43cda915450e463faa20 0xdffd95b246f912b97fc7c276990a2fca3fb53466 0x6aa6d3d3b8d5d014d6c0e6acc4ec894f2c5d8a27 0xeb43f3809b9064953d53613e5be6281b5404ce79 0xd730b101790e90051ee2db099ac8ee2c160d210c 0xf5520a56d18cf92e9d30064179cf8d9605617ac5