NETWORK PENETRATION: 0xfc414a0b34f951d7a2670677ba842103920b3601 :: Network Audit: Debugging Entry-Point Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-860F2AC3C6A8
|
Infrastructure Scan
ADDRESS: 0xfc414a0b34f951d7a2670677ba842103920b3601
DEPLOYED: 2026-04-27 15:40:11
LAST_TX: 2026-04-30 06:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E5987322. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 3.87 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-3EEA93BC.log. [VALID] Consensus reached on node cluster: 8/10. $line = str_replace(‘0xdfeccae3e93fd129226531b707846c2f57d339d2’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x79920fd2c6fd77efa2c530d1ee307fea5b23a500 0x936a5003492ee8d36e83b3f4d0118e5e7f3d319f 0xbedac634a6e5f383c2d537b92f80c087b02c0f8c 0xf2c67ccdfe1bd861cff129db06caecaf67ec1246 0x2707976ef33fa59a88040edbf4608f4422bbc57b 0xc95b6e90617e6833c13142f80a26adf13d84498a 0xf1e820e99627551666881359011f2019a8441bd7 0x63edac47db7bc42b74ec6dbafbbdacf0996e9279 0xd4a724757d1e59f250ba76c9f55439b7a07193fc 0x4257072b68f2bdfaf618ebdadcdb5e3ac3e68b03 0xbf634dca5c5644438fe930c2282787acdccbface 0xf222feec7391448e95c1b393bc4b1a4c33773546 0x2c7014f49ebeaa5d6c1feefd20f77de5a41058dd 0x70b86a666e28891c8e3f91b2bc6991d816ebd154 0xf4c2263904296a37c6fb6cb41acb2e3bc8a22422 0x5fa88f7e1c9ba5314e31634302d7ffe9bdd52e71 0xd675dd1832bf14de9378182b117410eec742efb1 0xb12c70821d2ec5b003228f6dee609d7f224cb35b 0x68905632ccb470647a4c75eb80636811024f8d10 0x935b2ddb389d57daa6dd69deba75b5beb79ebc67
