SECURITY SNAPSHOT FAIL: 0xc38fe11e24238fe02be26895d3a01e1d9279fc70 :: Security Snapshot: Active Debugging Protocol
Byadmin
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B39FFA4EB980
|
Infrastructure Scan
ADDRESS: 0xc38fe11e24238fe02be26895d3a01e1d9279fc70
DEPLOYED: 2026-04-27 06:31:59
LAST_TX: 2026-04-27 07:11:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0xc38fe11e24238fe02be26895d3a01e1d9279fc70… [FETCH] Received 81 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 7 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x9f. [TRACE] Stack trace saved to /logs/TRD-783B559B.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘502154b4…326abc98’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaedc20daf7260fa6f12394b39967f1530b1a48aa 0x4f8474d82976c795ac3f213dd874514f123c29cb 0x69d5e356dc0b527566fd8204b36b9d855b36080d 0x6c1535909aacc3a70744102ef0df86f792e3c972 0x21a19067cdd3ab566078b51fc868a8ad6906ac33 0x7b1cab0af29319a98ae6b3c384da67a6751f84ab 0x7d972e6f48427b5533d924dfc1f9fbfddcc9cdfc 0x232e331018e1c22be71f22348b4f97f5030f4b81 0x0bd73ffadd60798b25d0e8adffd4256e4703c567 0x3e901737a3673856b8441042d8cf2f0f8f8f6e6c 0x48e6a0834ec7738f9cac892ea79468ca6b01ea1e 0x22f6d953f2f4398b0550d9057625fadf5bf6a373 0x5f0aef33a03bf0028fc46dddd4a86ee3d29e2972 0x2f9094642d9fb66fb5f35992c0389baeb6156223 0xd2f2103d99c43da035acdc0c37b9c87920f9f2ef 0x04da4b2b504fbce4b3ce47345b97cd1c44b743b0 0x867ff42d00e67bd77a5d1dffc860cfcf1185cceb 0xbceb36d05be39956ec7854b84ad7bb05b21ce1a6 0x246c1d66566f8d9d0ace1b8a607f99232be5e2ff 0x06a91392803c96866b7acbf090f85816d5e90de5