IMPROPER ACCESS LOG: Audit Log 0xbb87fa4ea472bfc5c62b5263ec570f792c109a99: Improper Debug-Mode Deactivation
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF9C106A9BF1
|
Infrastructure Scan
ADDRESS: 0xbb87fa4ea472bfc5c62b5263ec570f792c109a99
DEPLOYED: 2026-05-13 11:32:23
LAST_TX: 2026-05-13 12:27:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 93ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.58. [MEM] Garbage collector: 0.67ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 21% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7261f62e4025ff75464ec475a15cc7c39f53ff5b 0x17e36233870fb42218e14ee13963b2bc445c7a3f 0x3a4d1147b0632de63674ce2175d0540aa6c6c64c 0xdff3c9f450bbd3a7d5699ded6780f55a981e9e74 0xf9a2f7652973ccc53e4765aaa1cb5178887ec01d 0x4d56ebc93cc2725e9ae99842f8778366d8312924 0x2680af1ac0a7a84dae3309b9378510ea429dc60b 0x40292bc77663065f26a681ebd66501105ff17c82 0x8f43418f92afa12edabae44f8452bba67016ddeb 0x1f925a5f3550361991c55932a799f09912c5a55a 0x2067dcabf23237fd89d8a241ec44a853db73dff2 0xda7dc42cfdb1ad7c9f9afeba4f3fb2ef54838a9b 0xc792b83e9a219e1d92a262988b64ae31fe5fd641 0xd506136e0d2a60b20069eaf9d97f9847ed30032b 0x46f921627d7b96b829e2d3fdbc8da39cd560e109 0xb92260b83f6c232ffbaa431b7c2789ca0697612b 0x25681d42ac84072756858ca4f3798ba45ce6ac4f 0x9330334e9590d373f819fdb023d0476aef621118 0x7ebc474a7e30b33af06cfd7c83a90dca0bb45fd7 0x6eeefc970c34c5938b03f5cf4450f27b974ff1ab
