29 Apr. NETWORK COMPROMISE: 0xb1fbda4963402da01aad6fd541907354135ab705 :: Insecure Deployment State: Debug Access Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-791961A1859D
|
Infrastructure Scan
ADDRESS: 0xb1fbda4963402da01aad6fd541907354135ab705
DEPLOYED: 2026-04-25 06:01:23
LAST_TX: 2026-04-28 18:12:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x1382758c). [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Verifying ‚require‘ statements integrity. [TRACE] Return data: 0x18129dda… [VALID] Gas optimization score: 39/100. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fa33c3cf57ebf97545e56f118432b9e49da2f38 0x8bdab31aa2e105c414503b2e74c21a9562d9af8d 0xc1f8e39afadf29420a0b8b27ed820dddb1f1f0a8 0x4fc63a4bbdc98f0d46baf8b22c914633658f3fd7 0x4600583c994390d1473fe0320678dc9d3fe17ba5 0x5352ac901f40c4b89beefd5582671213a2765a43 0xdbf258cd199c7dfca223fba5de7432b0aae25fd0 0xb61a63893b10c051ae3ab63117bf27eab06e967c 0xad1906e8397c49986ec1c2358783a1e5a1dc6d27 0xcb1982a7f11bcd80b6e54aea9ef5f669dd37bd6e 0x5cb87ab594aeed2888b94ad57eaf22d92420872c 0x2704eb503e5c6294a9a2b2388cac8dcf7704ee1c 0x4cc08e29878437326e24f8ff115ac02376d7cf11 0xeef5170735304776fbd286827757ccc4b6d93b8a 0xd825ce471bafea785a74cbe0110b2f530fa70305 0x26e05b5ddeeb221ee3cfb723cfb124ea8891302f 0x3b811dff83c04af8f3016c8f6376e82c7a103273 0xc52eb5f12d930b9d5293bcd62a1b37fa6fa08743 0x18a6b426f4ad506d4d0c1719d0eb4238f66101fc 0xac1ca3be2984472a802a862cd9fae84be4315874
