TOTAL BREACH VULNERABILITY: Smart Contract Analysis 0xad58ebed9ac7db3fc0f5ca075a70022e9c8f8c4d: Critical Debug Interface Leak
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49055170D532
Infrastructure Scan ADDRESS: 0xad58ebed9ac7db3fc0f5ca075a70022e9c8f8c4d DEPLOYED: 2026-05-13 05:06:11 LAST_TX: 2026-05-13 16:01:11 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x2ed4a5ac). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x60. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Consensus reached on node cluster: 9/10. [DONE] Log signature: ce962c2656deba431cb32a3dda6ebe08cb84eb1f0154b6e0b3f4f194efb0dfda. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8ac5efa060da5255c5a2a4c7bd207b9c44104f4e 0x63ea95fe4847a4c1960a7215554c1a294cf756bb 0xddd6b5b939938d4eb90d416289a62bb7f768f357 0xc6be073f6e7d8c95e237b89255f03a7918f171e0 0x0f34d5ae8a2cb75e8bb4d2e2894d5824952b4aa4 0x5fbb8b9bf236fdc80cb66286ff379d00a9224f73 0xebf2ca3612f6f606008bf1f67d181278abf11230 0xb3f09b6c5f0df2f0490b33911efa64f6d41b30b2 0x047724f4477c914ddbfdda0704f3510cbbce3096 0x1f7f04e9048953b9e1b9b2775c0f339e95919bc1 0x958782afe41ed02234570c5ef019ab0070dea6bc 0x6b184a26111ab81d90384ed53c652c81db931b18 0x91afa33b93693c52a63fe7876836164ace8541ad 0x7cfae186c759fbcf7d62af59ee446b8a9689ba1b 0xe90b09771636e9511b8cffdfd24e3bed84514efc 0x4b4217820c75ea9a7f454d10d93ea893fc29904c 0x4f60309c2c5337f5a7ae236f993c14fe2ca324c6 0xad0436a2e253dcc6d7d797e280d216d5847f9c8d 0xeae8a7700d6292b1945d54aaef34afe44d5a4d72 0x7431aa03d7051a71fff643cdc10e94814a2a8162