SECURITY SNAPSHOT FAIL: 0xba21e60239387e4eb72049abbc228c12b2dfc8fb :: Security Snapshot: Active Debugging Protocol
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5F5F8F2DE7E4
|
Infrastructure Scan
ADDRESS: 0xba21e60239387e4eb72049abbc228c12b2dfc8fb
DEPLOYED: 2026-05-17 19:23:23
LAST_TX: 2026-05-17 23:53:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xa60a65c3 successful. [FETCH] Received 63 segments of contract data. [SCAN] Detecting compiler version: v0.8.29. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 24934 units. Result: SUCCESS. [TRACE] Debug: 20c70ff20862ba9c. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x445818ed5b611c2f4a90c62700bd7482d8061360 0x11e750740a642b356e2e52b988b16bfa30ba2c50 0xfb277e414198e782586a8aec99c5b05eb06170fc 0x893a6cfd59d3a51d66b9eefa860c0e0564865dc8 0xf6d52e98f5d626646d3771b2257245bdea51ec99 0xa6f0aa3fb5217c0eab482ecc0ee467c16fbfaab0 0x316271e0acf2c8b87e16e80ce377f0d79cc60417 0xa28c606ff92ec28d2ae46fa2f9308502cda80ca6 0x407017dc44b80e7bb3c9f197312943e2f591e156 0x4b85bd6406be504832de9dede12ede7f08a72869 0x7d49351453cfa6cf2ebdcbef05104e33a407f6f9 0x214bf442486dfe14d248df958e867dec5ab2764c 0xaadf0bdcfa03a6ec8831b9d32d8925134a390b22 0x1d5c4e0a53e4b6654e34aba463d82ff48c04ad6e 0x1f74e7b9a7874f149812399f036a2566ad92aff2 0x23f7f8a9964511f35da36089d7142cda33ee3b18 0xf2aaa57cc48ea5ded2e840faba0503ecd8785aed 0x14765054d04997e512c5b805376483775d08ce25 0x44ebb23a4f020f93619d8ad6e7bbffc708077397 0x5d5f28edebe0348985b507fe71b785ae9f42a02b