03 Mag ACCESS VIOLATION: Audit Summary 0x0375fe8e74737ff73e114d9082ff682930cd9f64: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82756D63F476
|
Infrastructure Scan
ADDRESS: 0x0375fe8e74737ff73e114d9082ff682930cd9f64
DEPLOYED: 2026-05-02 21:05:11
LAST_TX: 2026-05-02 22:40:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x0375fe8e74737ff73e114d9082ff682930cd9f64… [FETCH] Entry point found at offset 0xf9b3. [SCAN] Mapping internal logic flow and branching. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 93% coverage. [VALID] Finalizing audit report for 0x0375fe8e74737ff73e114d9082ff682930cd9f64. $line = str_replace(‘0x16a6917b021c9f23ea3867a7a07772b52d2ee84b’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x83a560e788c7fb867bbd69da535188cc5489e2dd 0x6a5201774635c169ea1621b031a15370095acd8f 0x1424aa801affbd06480526e172b19a76dfd103fd 0xe5854139e7cd950c54179e206f8945b980a53196 0xc2187d424c1041435bd6cbd2cf6701218e9506ba 0x6cad8b622d98a10f7db6e1d670886f40097bdd04 0x6c08ff10b67f0b17d8f2a7213755791e052859f3 0xc4ba2b1bd36bb291db79c099a8d328aa1036e807 0x2da0a0666bf3d9d354bf6addaacb80b0732c770f 0x7d92332c168fe5631fb1ccb1390aa09c661e61ec 0x0be4e5eedc827fb7419becb5d8e2e7df32b3519c 0x7dcd1466f09b699ed73d743ffc0520cde1cc2ddb 0xfde41dc2afe30900660d8a475e1d7f9c700cfe6a 0xdcb97dfc7f1456ca8802f7994ada2bd363224663 0x7702bf6023f4831a74b7588f0950a397694807b7 0x03b5370cb159cb9b6e0995c13041de6af4bfdb98 0x8af00ab2bcf8f1ec54a1f39b12990f375da1d434 0x41e65ecd00b7d3505cb5bc483426c70bd338c7bc 0xf860bb0ae190296877fdcdb35ef6fc0f5e488631 0x206de6c0fd408cb53510d6eebc914927f8ef7537