ACCESS VIOLATION: Audit Summary 0x67a98cd4e119797c359df7e9759dd3d812a633f2: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2718C91593BD
|
Infrastructure Scan
ADDRESS: 0x67a98cd4e119797c359df7e9759dd3d812a633f2
DEPLOYED: 2026-05-01 08:48:59
LAST_TX: 2026-05-01 09:30:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x29cd. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x86da. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-FE4FB295.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe67f176f861f90e2153118f9c735c53546d161b4 0x489ba2b12dfc92d10ca196bb29afe6b41dd598ad 0x07502b7162249bfa55004bd49f89549b15122298 0x72ce7dd9bc40460df0a06c54f68c03d47b283c23 0xf85699c6a22c40d8d38129657920b0852738318c 0xb4f3fbf666672719d5fa0d98c867e91000085222 0x812c612470f8f06f437ecd977388a403a0cfc6b3 0xe44eb5d191015064983928474200f95c054831df 0x0f436cf71daad156b72ae36c6077ff3419e6020a 0x0c6fd97975666e5eb9d85db2fce80e938da6d871 0x020a92cf4023aecb1a5bba89a96e0330f5346cf4 0x240970848da0a974db149962cf50aa7d1cc64c0a 0x36ffa107ce341c87b22a62e676259b16aabd894c 0x093a029c41130a55bbb278eb9d35327b32c3952e 0x14b51813b0629ded49eb9438164293aac660d6f6 0x6482b389c56abeed5dbbbd2bcb3a115c267bf157 0x0b98d15f50b20cee3046775a6361fe59ca7196f4 0xfc9b0e16f6ff664616b5ef3cab8b1696900cb94b 0x6a11a06ee7e9d63f41741284ce8ad0cde268fc09 0x4179a4dc1bc5ed7ebb65a135e64c49cd818fbb54
No Comments on ACCESS VIOLATION: Audit Summary 0x67a98cd4e119797c359df7e9759dd3d812a633f2: Accessible Debugging Interface/
Share :
