LOGIC DESTRUCTION DETECTED: 0x6012fb19f8dcc5502385f2f9896652a8af192946 :: Logic Analysis: Residual Debugging Functions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8770522146EB
|
Infrastructure Scan
ADDRESS: 0x6012fb19f8dcc5502385f2f9896652a8af192946
DEPLOYED: 2026-05-17 13:33:47
LAST_TX: 2026-05-17 18:28:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xc2b7e348). [MEM] Garbage collector: 0.36ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 57508 units. Result: SUCCESS. [TRACE] Bytecode segment 0x21 analysed. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x184840f6d714ff2ac59b2197c5e0d97402a7de7b 0x415d618c4356b5d644661676e0731e0ef23735dc 0x6b07187cfa7255160f4fab2d3485a4208d8df279 0x3e0cf502d3c3a43bd2fe6dda27e40fa806e06fc2 0x15184b0338ae8a7f10c7d996012e96974ca8f3e3 0xd2904860b856a075aafe628856ed08872a32aaa9 0x32085a25a6191cadab7c6dd0051a0ac9ff84523c 0x3aae49473954d8d5603b1fc9c1d932f982001f3a 0x23de01f74c902ebcec8f676c95044c47b911f5bd 0xe074d025086491576bd224218f8b98289f879d76 0x69aefbd1a425b13bfcce67bdd1514b1577bb85cb 0x3f7768d3e9ab8b2c45527842614a642b5a12f2b3 0x2962e9bddf3e1c588901a12e9478454607856fb9 0x9bf437d4dbeb8e5e2f348f0f5f1ac40e9ee81e88 0xa58250071530fd65739a8260504fe80bf438256f 0xe5b91b30a1c0e200954c1f2541470ac43c0bc9d4 0x8a2ded6076115271cf4ffe1256ad99f7a19ef4b2 0x260abff7e9a343ee6a60b41b8c5aa00ed35f6958 0x308177685cfbe0e7e7cdc934b3ed9220e82fe287 0xf2ccacdbe3075399fbdbe1a9afd10364a4268fb0