DEEP SYSTEM VULNERABILITY: Deep Audit 0x30fb6f4553616af8913191c6dfe019edea259656: Maintenance Debugging Left Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E231C350C900
|
Infrastructure Scan
ADDRESS: 0x30fb6f4553616af8913191c6dfe019edea259656
DEPLOYED: 2026-05-02 19:36:47
LAST_TX: 2026-05-02 19:53:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Latency: 33ms. Protocol: JSON-RPC 2.0. [FETCH] Received 36 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Reverting transaction at PC: 1356… [TRACE] Return data: 0x0ff05ec1… [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1fd83bbea6626d5b73b026a5f348b54377a5d61a 0xc32ca3abd4126fc6c1d4e0ef3dee6b982dcdb3b3 0xd6e418f4305111b6bcf01a9ea6439b78bea4033a 0x5a37ba843bedd0eccad8713ffbe6b610665d1d6e 0x0f9a97e84cb5066571daa8fb0850d0fac0d44c8a 0x20b672609664d724c5bd86226aca5b8e0f860f82 0x8634b5dec376d532d18d1bc9017961157a0ecaaf 0xc5944fbbccba3bc6d529dc4b8d90f6e3a0d02be0 0x856ca91d8b19b55084a59e5ad9c61803a4371bfa 0x2e14465a9e858e00f4302ab60cd7b6c120efbc7b 0x25baa39eb2097e4fa1936ec2b38bfc2f0df98fc1 0x5ee67c9dbef0c49f78f0f60d4409ef63762f388d 0xcd755df59073dac68914cc9a23b141e54cce1534 0xd3c1171f9d3896b474aafe23cbf1d0f920d2b6af 0x11d8201747e5ccd267db6ca990739f373f1db6a6 0x64ebd1053482b9541bc15e3f0e83e575bdfd840b 0x110c5c3820ee7d1d92bde8feab5fbaf4e516de29 0x31185189f48e10a34d60788f1845938508a9841e 0xe6eb7447891622edc78a9a816bd0ec2f0e153c30 0xb740c82708b31c0247930b1672fe57201c4169fa