06 Mai DIAGNOSTIC LEAK: 0x6d3fb717e6a5f4ffa39506e29aec09a52558abf0 :: Diagnostic Warning: Debug Mode Left On
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EB95CB5F3E0
|
Infrastructure Scan
ADDRESS: 0x6d3fb717e6a5f4ffa39506e29aec09a52558abf0
DEPLOYED: 2026-04-30 18:31:59
LAST_TX: 2026-05-06 07:09:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 34 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x8feadb90 in memory heap. [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Reverting transaction at PC: 5560… [TRACE] Stack trace saved to /logs/TRD-7E558EC7.log. [VALID] Data integrity: SHA256 verified. [DONE] Report exported to IPFS: 1c52f9cd…9b054434.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe7ee85569e7362664bf707706e753ac8b90eea59 0x51c2be2c113955befe4388603385311ebf3cb4e9 0xba97cfd3469717574c621803fbce50dd16516b7e 0x4214c6bca69767cb2245c164d07d47e910b2148e 0x0080c640a4e6f9a64b75e2639e54fadd457d3a29 0xee163157ce28339a127723c952b6a0e793fb8b0f 0xc8a39bfd71d82abca351dcf67067691e14af8dc1 0xb95aea1dd5917c7436c290ecb6893c541a9b7d0b 0x29e485ce51a4df0b9f4e468855c1c9b4145bdee2 0x155b8ecceace7354bb00648b2ed9114ddff813a9 0x59e53050be64802e7f3c4c9ed6dad9a117cf22d1 0x4c5fa27376367cc08bfe84cbb060ab49145244b0 0x00458402e4c8c6bcd1aef32cf43a787f09a57441 0xe64ec8690a2d06f821eb915ea67242d92d8351d8 0x368b6f09d6954cd392238aa72c460f34a48b9de7 0x7c7d79af07eba29c8ff01c9b8bd539009a2adadd 0x2b89a1ce9fb27e8378bb1f042bdf701b76b4800d 0xed5b074b8dd71b96e36affa393216ebba3bc6117 0x59a74843afbc77bbfe29f704fb9689464a8da1b6 0x900bed2aa1438c1d015c40281a4acf5ffb43704e
