EXTERNAL BREACH WARNING: 0xb91339a885cadf33c7d001726aca1398cabccae3 :: External Access Warning: Debugging Port Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6AEEAE3DCF94
|
Infrastructure Scan
ADDRESS: 0xb91339a885cadf33c7d001726aca1398cabccae3
DEPLOYED: 2026-04-26 09:34:11
LAST_TX: 2026-04-29 05:27:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x0f23. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 8938. [VALID] Gas optimization score: 40/100. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb96f7ee4ce526d54e3e784a25585e1cab15931ce 0x42ec001800c6c9595275ab28d0cd7c6efac936f8 0xa32b8577838acbefe71071fc7f3a2017d823f429 0x51cad566845f46498e6c78d98f915926dd47ee88 0x5ab698a44d511c7c5a5e5d2e85895fbead0776d2 0x587fec629ef31569a50dc905271eb4a7abeabc2a 0x2fadbfb6b08ef5a268840bc07a7d6792c28b46bb 0x668ed2973b71acf3c8ddb6876a44507128f7a105 0xb73b9cf8913600b716c86ef6abc5473b0223ea6b 0x6f8b410a6e0e6e61e39b4d217c6f45d8376e108a 0x1b6089ca04700efdd39c5463935fb9c6ccb567a1 0xd3c760a78e28e49667de95b7bb08b8ac0c6dd254 0x4fc63a4bbdc98f0d46baf8b22c914633658f3fd7 0x10966ce24f9f2fb35336b286da44785eab9e8627 0x743a2102131bc4b153c2b3b6b366c11c1c5e0a8a 0x4c3bd2a854c0cef0ce12b7643743b61e07ddd978 0xdef94e5bfeac6427d8029b1252eeed65bd3056b6 0x390544e8a702da2bef469851339fd333e57ba756 0x7915be57450df10a8da82bec64d98b09703d866c 0x6926ace800ad3989f9a0c9aebcff4e5ba8acc8fe






