المدونة
INCIDENT TRACKING ACTIVE: Incident Report 0x6588eb3f1869f7cf94293f03c4f9aac783b9bb71: Persistent Debugging Trace
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EB37DE5608C5
|
Infrastructure Scan
ADDRESS: 0x6588eb3f1869f7cf94293f03c4f9aac783b9bb71
DEPLOYED: 2026-05-10 17:24:11
LAST_TX: 2026-05-10 17:53:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Detecting compiler version: v0.8.25. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 57. [SIM] Balance check: 6.62 ETH. [TRACE] Call sequence: c41a -> f932 -> 4eaa. [VALID] Gas optimization score: 14/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcbab7c3ec6f5232711b230fb74ba17e1e0720ad3 0x1771ccbc592530db82aae5a214445ce94adc9d11 0xa8ac9af6d16422e91d4e64ba415194fd7a3640f1 0x630410ab4b3cc64a986e224a59d1339b9c25bb1d 0xea32461890e3d657a537582b251231c7d5e924e5 0x29c1eafad51d4a1562af6c3b08047b38fb4f1dd6 0xeccc395b88ef022a21aaa8676dd795a09c61c0d4 0xfa63f3b173151b04eed42aea505e559fe670f0c5 0xe21efe288cf64b8ceec71ebb455defc4743b0a7e 0x73209dffa1c40cdbf1e368494d00f817307e3dc8 0x07fc4598ef3db309b554dd7223b1a31970e3e3bf 0x72505ee5f97d9a6cd3fdfd731efde57537821f87 0xdd658fc5910933595074fadd27db4f557b0c5766 0x8487533cce638fcd6b9d65efaeaeb2131e68f721 0x306429e3d783ce69843f7d4f9951c9716a58821e 0x1929096c959f500b8336fcc9491ac6a2c9f206b8 0x99ffa2ca700103e1315ba742b3277a063ebcdce0 0x7d5a58695f667409424d32c0517cb932614eefee 0xafda9d7d0e05bb0030bab0995218855ebced67d7 0x9e6a037bb3cac53cee46af12bc6a7b55d6e22591