IMMEDIATE THREAT LOG: Critical Log: 0x45881f70c7b423d3527775a60d8fac25385c374c Production-Stage Debugging Active
ფრენები
სასტუმროები
₾
GEL
- ₾ GEL
- $ USD
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-75EFBFDD5121
|
Infrastructure Scan
ADDRESS: 0x45881f70c7b423d3527775a60d8fac25385c374c
DEPLOYED: 2026-05-08 07:45:35
LAST_TX: 2026-05-09 02:39:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 89 segments of contract data. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0xcb9d. [VULN] Warning: IS_DEBUG_MODE found in storage slot 95. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe4a3b25a22726824b03421fd0e194493eff58fe9 0xeb620164d0af2d5ee102a38db9b5edb9d75fcd76 0xd35c6b105cbe3c2f5fdf3de34a5a9542832afae4 0x78a628a7075f9f8592bca9a1d371deadb13e624d 0xe0fa21068ce1155c16bc76ebaa53366c1cbff230 0x67f8366f3336baad5eb985a00c9988c551cdc8ba 0x60749818073872834228590d2121f4c046dff91c 0xe8ec2bea1124b61282965096137184c20fb6f1ba 0xacd9856becc8dc3f996ac0f06c79c1a6f5448e47 0x7fd25d02bdce5f953c4d075b54f065fa4a42d1fb 0xfdd76230fbafdf3689ff1310f5c9325d5a8fa46b 0xd8f971aab0dde499086109e311114b38fc0a449e 0x415948144d09f42ddeae09da3245e491f2e4eee6 0x161920457b8db452aa5353e482068d3d72732939 0xd2f949b359a3c326fb832f4fdfe159df99b51400 0x7432a732d004eb7f010fda2ee04e24640151f97d 0x299ff8e315c1482dd58dd35cea76d0c69a9e9a42 0x088819f032f132cf6bccaf8317ffd5f4b9e6dd09 0x6330fd760bd922fcdf03b10bd32f48aa7e3d1ad9 0xa77851a0e7ab98b0ab11691f031c6b32890daa7d