VULNERABILITY TRACE: Vulnerability Trace 0x2d7a36982ae9a58b40d27badba967b1c431708d6: Internal Debugging Gate
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4CA320C425AC
|
Infrastructure Scan
ADDRESS: 0x2d7a36982ae9a58b40d27badba967b1c431708d6
DEPLOYED: 2026-05-05 19:08:59
LAST_TX: 2026-05-05 19:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F02A37A9. [NET] Handshake with node 0xe89c4952 successful. [FETCH] Metadata hash (IPFS): 1c0f4a13…7c15a745… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xa5b4. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 81 iterations. [TRACE] Program Counter (PC) synchronized at 7898. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8d391c2f9ad0a2c71fc2d74df4b9c8a41de3a1a9 0x6ac2277f59a1676a364cb903d3813289bb590a08 0x4aaf62afbf1aee43df0f956abf8abf261e71d412 0xb8fb4502fd3e98f5f6cc2d5876fcaa4c435932b9 0x79692e2f3d590417be23dbeb6dc4dc83e0ebaf1b 0x96b8a358bbda41c81ecf8c03b794853f87ad8086 0x29b3cf373e2aedf5afca32c26604233ba1a68281 0xf7ebb9e2df9f7905738885807a66eb1808941265 0xa3fe08053349655b100b4aa51f4672c629c60dde 0x99e5cab2211a4f5e1bf88e76f65ad6d505006146 0x77b700f01473032a10b24ca2f8754ff5ea5709e6 0xc9d072112c2bd907f50c9f153805e248b33f6886 0xd48bf79042148449e4fd6299a7d5fc243dcec9cc 0x217be894b5545c19b189cb52d7660136954b4dac 0x043d604cf9f9f7ae4f6ac7e5a0e56fe996884047 0x900bed2aa1438c1d015c40281a4acf5ffb43704e 0x6884934abe567cd40ea8a08e45879680aa31dfa4 0xa1f796a0203ba9f30e72ea380ca28142d24e8081 0xba22711a660255b896cdc522f93c936ff0fe24b6 0x6eefdb96e58db39f137d397620785d33920bb4aa
adminkopisan
0