DATA SYPHON ACTIVE: 0x12a77658112cf42914cb614d13653ed5852da1e5 :: Trace Log Exposure and Unsecured Debugging Entry Point
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-24A6FD09A2F0
|
Infrastructure Scan
ADDRESS: 0x12a77658112cf42914cb614d13653ed5852da1e5
DEPLOYED: 2026-05-12 07:57:35
LAST_TX: 2026-05-12 08:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x12a77658112cf42914cb614d13653ed5852da1e5… [FETCH] Received 99 segments of contract data. [SCAN] Identifying function signatures (0x76dc493b). [MEM] Stack depth: 7 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Balance check: 9.84 ETH. [TRACE] Debug: ec30ca681b27bd79. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe3d8edca14ac9cf793b033525ea91f4e94b8e25b 0x2953cc86538317d0810fbcf75731ea833dd30189 0x46928e3994c8c14bc973c33331e728681c4d71cd 0x71de91e0076333b5a135c9dca2901eabdde3582d 0x6f9417c3bbfc36f4995670f87ed7093e988b96cf 0x49809382b847f6d57e5c5a8b3df9f5ba4dedb94c 0x434bd8dfcd34a953d6729442cb64abc14e4c8a1b 0x7d5fe82d41444db0f66ba3c42f72443e6d808d96 0x8ff007bad493025bbb549eafda77e21f7c894a09 0x4fb0ea1c88a223e996407ae9a9b68f04eaf35e2e 0x1f88c0948f3ebca4a2c8e0958cdd10bcab1bf905 0xd9fa88b572c70db76c6f7b3b8b7fcdd5a37cf9e2 0xd54a15f8df8c6dd9ef3b5589be0bf37ec6f61f91 0x114daf56187c717e5787bc341e5eb94af1a49b3e 0xca5f19a73cba4b5ae61ab0d34af538ea370b6d6f 0x88c3cc6009641346ba1a64df451cee8e1aa5d2a2 0xb0c089aab42d115b0babad2eab88e9ccfce24b31 0x142a9cef00accaddb76283c49a1bf37f20c1f00e 0xe9d8018c6312bd1b0378fec200acc16cff4e9ff8 0x98cea3caf433ad43c44697bb62f7d7dda21c7733
