30 Abr ADMINISTRATIVE LEAK: Technical Summary 0x73df03cc96493f53aed5140c0221b40fae6a6e0e: Debug-Interface Accessibility
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-28A920484489
|
Infrastructure Scan
ADDRESS: 0x73df03cc96493f53aed5140c0221b40fae6a6e0e
DEPLOYED: 2026-04-29 10:39:35
LAST_TX: 2026-04-29 11:39:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 29ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 0110ce08…63474e58… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 3726. [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7a7799d55ed242269f8817426c2c6d14dd13ee76 0x606674e9b0cd3aa3484f52c933aaab306a439805 0x775826ccff066290cf75c9119a652a854e598382 0xc2fbfcd4b998b236f41ade8ddbacf0f79d2c4fba 0xa270d2fe6f2c8e35b1efe6b0e66df38f750af50a 0xedcd1cf62caa9bb55ea663805e3ffb63c59bb2ed 0x97096fa7ab8685418f6851c92d481ab615ee4639 0x51ed3b6cb58419cc39cc9599ae90e34386c964cf 0x84ecd8c4b989c3609a3be53fbefe752900edd2c7 0xfbac2842860228de144a588060a29d0b1af843fa 0x76ba1ca3b54e026ad8e9a3ecc55c11b393c0e15d 0x305b37841cd9c7ac01af03fc6c7b2109b19e966b 0x514b47df1ee11957228247d8308943d779df89c2 0xf97afd094213be853449511808c6138971826fd6 0x2efebda82dba33d0674ed5d693a61b543769ed04 0xfdc7d33cfc54d5de7bc2ca0b552b6b3212d56747 0xb233614330254a20b0fd9b72f7e6085f6ba39b34 0xb0db6a6bc8efaa0fb183d43255fc1f925f9dc4de 0x79f9e8e0e23136d2fdd4bb559a396dc1a0f9a210 0xfa604f35bef38db91afe520b046b50cd4bf38dad