NETWORK PENETRATION: 0xe3e6d45a7edd0d06f7356314ddf1ac433d37589a :: Network Audit: Debugging Entry-Point Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D8E5741AEBEF
|
Infrastructure Scan
ADDRESS: 0xe3e6d45a7edd0d06f7356314ddf1ac433d37589a
DEPLOYED: 2026-05-06 07:03:23
LAST_TX: 2026-05-06 07:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.81. [MEM] Stack depth: 5 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 1478… [TRACE] Return data: 0x413d0412… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f6beeef12f92fc82d4aa4d01e16241613f09244 0xc6b4832473593a5c4782d1c178f5ea6c7352f09b 0x77018cfd542ecd6eeb20de1b31a831b80d592baf 0xdb90c618d3fe3ebea5f8e9ac6e2e951b6c94d3ef 0x4e958b4376e3600665b573106ee34f9291f02bd3 0x2c8d167f7cb5e22a9233638fee9bda585bb6942c 0x222e95dfc6a2f76ea26f5a768d3a21a70735054b 0xc04260de76bc009460b8bd9708a7c529d94e8c1b 0x3111b0c48624bf74ab799a1f560312cfb3675aa3 0x0e703701e4f2bc9bdd7f845dabdd460992e1f157 0xde54cde602ea0979202d99a779491f997a3a11af 0xc396452b7bd7cb526d577482d329a29b57a57634 0xeb85f021ea5658525cd2c098aacfcfff390b79ff 0xa9a1d4cc7fc8f258645f27a9170f536a8549119d 0xfc7c117ad317a7db04c99cadcc21baa994bbb05d 0x80339d73e4bacea992807f657a9fb7b7664d8284 0x52baf1a1d7683b630a43d9bbc937d9c6c3debf37 0x361ede80e021bc3f561e1974f5fe7e9186e07630 0x7c873a020ebd3d798884f1bcfd12cd1af1dd3a33 0x195c717e88d9800cf3d2d6afd7b5c20b44d4d0d4
