NETWORK PENETRATION: 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a :: Network Audit: Debugging Entry-Point Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-461DEE9A988C
|
Infrastructure Scan
ADDRESS: 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a
DEPLOYED: 2026-05-01 04:57:23
LAST_TX: 2026-05-01 08:46:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: EFB5DA1A. [NET] Fetching raw bytecode for 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 9 private methods. [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 2.93 ETH. [TRACE] Bytecode segment 0xc6 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x833e84ef43da48416df6c046c7b803602a3095a9 0xab29068ad2444222f8115f7ee6769921b28ee158 0x1125eed321a48ad48c4a8fbd8a6bad538bb85780 0x6c5ec9e149d4427c0fd89110132b51c5f2d25416 0xdf72b766e5fa694f836bcb806a69524f03c2ed68 0x8541693998932d4990aafc15735e76e8648ec788 0xb97ea4cfc2570dd448e5344335c75e53de7af049 0xd4bdcb12b70f18537469ebada3bd2ca0693f7e67 0x59339f38f8a93ad5889525a09b01bc64305bd8db 0x4179a4dc1bc5ed7ebb65a135e64c49cd818fbb54 0x36f5930e314b2f611a786476d939f47b318c1939 0xb7ae88162f634a426780f9a774fc70cdcaa2c19f 0xebaee1946742bb41af1ca47d7572797f034f7a20 0x0f97f69dcd97fb5cc2eae05d6a1d5d4024863774 0xc770356cdc74d92604cf43cda915450e463faa20 0x59a69309c7e9f2dd20dd388be34e19f67c2307ba 0xdde432ef2ecc471b9dfe55c72b890cc046da1500 0x13904eaa07e826cce9fabe36a6cba94724afc5f5 0x200a9bcf098d04ecfa012d7133c2e5561e56e54e 0xaa8ceee481e212b98a07ec62fcc56fc34570c404
