NETWORK PENETRATION: 0xb3c94c3e8177e6255fb6f95b285e34c3b79b3735 :: Network Audit: Debugging Entry-Point Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9DBEEB914077
|
Infrastructure Scan
ADDRESS: 0xb3c94c3e8177e6255fb6f95b285e34c3b79b3735
DEPLOYED: 2026-05-01 18:13:35
LAST_TX: 2026-05-01 18:27:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): d6864f6f…34f247ad… [SCAN] Analyzing visibility: 5 public, 2 private methods. [MEM] Tracking pointer 0x00f65b1f in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 28. [SIM] State change detected in slot 0x6b. [TRACE] Stack trace saved to /logs/TRD-C8ED9FFE.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4b696a6d99a12ecb1a138d6a5d4fbb4a472c49e9 0x4169d580c7c37e9003e16ab5eae909b122992d15 0x0be45e75797155078417d1a0c32c8b8926403c87 0x50468292d0cff8ad6e3d71b1e2704a37b0f37cdb 0x2eea9b566df86c46db3e3d35921644c7f18a07ac 0x2572e15f1c0806bb6d8efc0d867caa27bfaedc40 0x4f1ea959d112e35f9317258f18b704d03e487c69 0xc779ec03d2e6a31e309d27cdc0e000b4692eed18 0xd69431848873bc2e478e1ca268f412fc49533e9e 0x2e99419b22853e95e947062ef620a284cc6a3c82 0x1b02d8b381a66fe5b9a15f813f1809893bb9c3dd 0xa78ec0aba5d5b722b38245345e502a3d69612c14 0x50f7c99d709e0807e8e5ec00be36920d8ab89513 0x307282099d41828491aad150fce4543710dd0cdf 0x3703cdc5407007674838200b7b9a58de47252470 0x309f27257f83f78b7e3f870c1477935c949cc205 0x97ce1e7abc9aa4ad71f3f998b7c9377935ce9e7f 0xac510ef9e1ee169926fae7b68b7c25614f3f93b6 0xb876a03665e8b7d286e0cf4233270ab0d80cf2ad 0x0205f891f52918722b10dcb1af52258f10063058
No Comments on NETWORK PENETRATION: 0xb3c94c3e8177e6255fb6f95b285e34c3b79b3735 :: Network Audit: Debugging Entry-Point Found/
Share :
