INCIDENT TRACKING ACTIVE: Incident Report 0x80377f01f514a053aaea056c1342f1bc3e6bfc6d: Persistent Debugging Trace
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1F44AE14772C
|
Infrastructure Scan
ADDRESS: 0x80377f01f514a053aaea056c1342f1bc3e6bfc6d
DEPLOYED: 2026-04-24 14:05:47
LAST_TX: 2026-04-24 14:26:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x80377f01f514a053aaea056c1342f1bc3e6bfc6d… [FETCH] Metadata hash (IPFS): 4abaaa36…abffafec… [SCAN] Detecting compiler version: v0.8.27. [MEM] Tracking pointer 0x9ebe0015 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 1351… [TRACE] Execution path: 79% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4aec34a83ce355d34c99e58dbd4fa056c8bf97a 0x0292bf5a63676b213aaf173584599ab5c3a28104 0x32edbe2d608767e6281022b8e43b580243311e3e 0x13904eaa07e826cce9fabe36a6cba94724afc5f5 0xda16b19b1dcac4b9e35e9a803e3906b5acf5586b 0x97b403733d7cad4aff83b7e79d0875b78a4c070f 0x96e26ad99420848d47fcfacede518a0906ca326a 0xe4015dabc74725544b398f9637e020c586f9081b 0x2569562123fb32147f0bed9804b7088d372cf9b0 0x788d4dc49c99d67b092e0c4abfddc33c3d8e20c3 0x8c490e9a52ff1faf11af5ba7c2d0a71f48145e1e 0x905f388302f1fbc1dfbb8a6c648f381ca10a0e4e 0x3a4e59f60b43078042602c2275338fd005c34095 0xec597919fcb3199fc1df04ee7ff7f718012bc765 0xc152356b4059c3c42f8adad6bbfc98f1c375d823 0x20b07e2a5c45ae126f795ab7bcea9503a0caee46 0x6a73760623d06e6fd93da364367357f3cc656f73 0x405fefe9a6a3179947b24cdfe19a5a446790944d 0x08a963c8ebe198eb93c07634cbb75bcb91a6e3f4 0x4257072b68f2bdfaf618ebdadcdb5e3ac3e68b03
