IMPROPER ACCESS LOG: Audit Log 0xf6d6c3674b617c548249061ac018f43188c874ad: Improper Debug-Mode Deactivation
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6288721E8F31
|
Infrastructure Scan
ADDRESS: 0xf6d6c3674b617c548249061ac018f43188c874ad
DEPLOYED: 2026-04-24 16:42:47
LAST_TX: 2026-04-24 17:45:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xf69faa5c). [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 83. [SIM] State change detected in slot 0xda. [TRACE] Call sequence: 89cb -> aaf8 -> 1e78. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘e5d1b65b…87927814’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x31480efd56f0f5152dff80b90bc88552a7dd7ad8 0x48f9a46ba852b5c22d4153d0534397b59abfdef5 0x8b4105cfacb4f1a1810e10ad63681bb7b053fd4b 0x46af615838e174a24c62e64ce097af81892704a8 0x0785a9afb1f009098f1a8941eb2ba8a187b6bde9 0xaeeffda575576e7d84b6646596ee197ce33d457d 0xbf7055cc9fc3baa707b3499770e6059d55f7f601 0xa06afa5ced46ff891228724de7019ee76e4e6cdd 0x1c592c1b8a984eb38c5792e7cee2b034bd2cce99 0x93d864ec5c1fde56866de5f9fb1689a2134d879a 0x1a26b67c5d3e3e8b8c7f2f61a1f002bcb7a64b89 0xbac3dd6d0333ea14f957b7b0796bcd59e8771501 0x37b91a5a4e4732c8f2b41393dc2e11fcd7e48dbe 0x6f3441ae4059a261c207f255200d8e905f9770e4 0xfd65276b5d449ea747434cce6a5a32651c8d0e05 0xd588ce9a99edc1a043954e8412751b72a57ac954 0xda0f122138ec233fe7780d516d2422bda6a2da0f 0xbe526b680ddb97fcbe17d6de5caaaf0e5641bd12 0x9a38c3ef5762997a8f527f9df9c4cf0f4d53597a 0x15912d5deaddd2d36d8b1145307a6bfd0721f1f9