DEEP SYSTEM VULNERABILITY: Deep Audit 0x90f43ae3e7387f6772f499ed5a751cd3b450ab05: Maintenance Debugging Left Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F478EE3CAB3D
|
Infrastructure Scan
ADDRESS: 0x90f43ae3e7387f6772f499ed5a751cd3b450ab05
DEPLOYED: 2026-05-02 10:22:47
LAST_TX: 2026-05-02 10:32:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 29D6129A. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] State change detected in slot 0xcd. [TRACE] Debug: 7eb98cc3d0ea7681. [VALID] Gas optimization score: 92/100. [DONE] Report exported to IPFS: b882e399…7549f4dd.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0ef4dbeab28159887f0c2eb87b509722a7b11917 0x5a2ce62e46df64c2caabd952b67bf0294e87a1f6 0x26d40d96ad4787a95fdccbbc93eabaa2dbe78f47 0xdeaa2210673ff6a79cabeb0fe4ad0ccd18c675ed 0x0140b11e500e0f555bcfa1ee5c55899ee90f88f4 0xb9306c43092f4719e3805b190f78b2d5f60a2686 0xd10f9de8e1d72cae3a2ef96748231fd39e6452ee 0xf3b195da77c536d4477cbec2dbc1498804cb0fce 0x905a9d30cfe5b2cc46dcfff6b3d6d9b7dc944fc6 0xd69fa636110cb7f812eddb4f897f3ffa7995185c 0x3c909d53da9eccd51ab857333c205f0e094feeee 0x24c8abe45190f0398a30285ffd89c5ce762f6a17 0x891af5e2e20aa8520cf23fc920b0129c69d2e9f1 0x614478dfaa45e43c3f815d385f646956c8157134 0xb6e5cace2e50566d1df7cefe1e2ef156a2082197 0xa72d5637ecee1a2fecdb04255fb06acb66811688 0xa1469ec8fd027fc55b21ab31a88f34e7c8607d32 0x2710b4ef144c2628dd3628edc0e8909d9230d3c6 0xd86e3823a26d520990b5f7779b1f1e537766d92f 0x1d63cdda6fa0033530bc4c18e6ed0f2dda330eed
