Audit Log 0xc4d0505c3e5e7faa75b2afcfd9ffb0730edddc3f: Improper Debug-Mode Deactivation
/в Servicii /от dis-Gesan-G
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BDB28CA75F34
|
Infrastructure Scan
ADDRESS: 0xc4d0505c3e5e7faa75b2afcfd9ffb0730edddc3f
DEPLOYED: 2026-04-23 22:21:11
LAST_TX: 2026-04-23 23:03:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xc4d0505c3e5e7faa75b2afcfd9ffb0730edddc3f… [FETCH] Received 97 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x3f95b1b6 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Reverting transaction at PC: 1149… [TRACE] Execution path: 95% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x998bcf45aac39e6f13faffe05f3c2de5a7c1dc1e 0xd9a71f2022230df2fbc4dac2e32b4dd161de8347 0xd40febe77b4a9bde56e13cf4067638b98a061925 0x8a0c80c94002230a6955111f4fb3e5d680357dd7 0x374c54a747495c09f5e2d2109aebe5e3d13dce8d 0xe5f65a68bc5330926b73de891b5a66396b1804a4 0x651b101f72f82630cf59c68e6ee4305afbd3b1f5 0xa3bd0ae31b507d08148b2d1f2cb6989516069c51 0x992c014028f095ace3ee527fb6d2e021ace7a050 0x2603419d415e478469c648b31d6c496aba475569 0x6407efa45fb767f594e1e966eccb621176c58b28 0xd0b845916dc72ed922c3e6701506b6c1162bca33 0xd6659a3cb77b7c7d05e9c066482d7411b5d0ae25 0x900ea24537d5dfc86bc1f7826247270bfa7609d7 0xd3c16b5f0b959e8ee07c6e5670b7c478dd104de1 0x2438beb3745f932ff5330abee1073926abc8b0fd 0xabbaf31d3c59e951b9af789fe030e3a1bc36c3b4 0xfd167731dde599ed13993e216d375a5722d72c06 0xa38f7738ea1d716baa81bae51cacc7610423783a 0x0f01427967bf95ad8cfc1327b53fe49ee2102b09

