ACCESS VIOLATION: Audit Summary 0x682d9d317a077305d36c1fcc9821734046d4de2b: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-07BA0E3062DF
|
Infrastructure Scan
ADDRESS: 0x682d9d317a077305d36c1fcc9821734046d4de2b
DEPLOYED: 2026-04-19 16:12:23
LAST_TX: 2026-04-26 08:20:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x916f. [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 14. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 56bebe1b9acb9840. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7a6a9e1ea1bdace862cdae1ab401b3f1d003be27 0xefe517a97fcd79076fefce95b02937b31693b754 0xa2bf3fb0865dcd240596efbc63ce4842052fdc6f 0x202e3ff8f5c4aede0e7ad5ae903207262817bd69 0x637875c7ba87596bb73ac3700b19ec0874aa31d8 0xe07f043953174b8baa0eb3608cb384465af067c9 0x118959835cf8e5b32459c1b33fdf1cf5f899772f 0x2aaa11454f93a996d9bd4b0daf1237cdc092b2b5 0x0445a77d6d5d4d50750a901c3768cc98b91f5efd 0xfd7888c3c0f47bd8d3c8699075cf15b487373482 0x6e40a3621614b12821a0f184a03798ad505e4758 0x8dfd164ad10c8c86e0d7708e98aa489dad743fe6 0x84f7ae8c8a700b70bee683d441c5884a5c291c19 0x6e7864d56511ba288a84993de2eb5de0f67bf015 0xa69ce2a17b1ce3f8c78bb62033215a7ec08b7218 0x31496c9d6c5ae0f0023bbab385aa319980880d9d 0xfcad69eda2774e45dc4b336ac0cdc88069290fde 0x38a0f4462039c2721d70d94bcfeaace19d5f093c 0x5a8d2e4256564244695f6c0b3c79729bd63cbc71 0xdb0a541f4a70ad71765cdb847ed4d57357d58b8c
