SECURITY LAYER VOID: Smart Analytics 0xea26c97c39944335129fad43a4943bb85be73276: Debug-Layer Security Breach



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-297E579FC602

Infrastructure Scan
ADDRESS: 0xea26c97c39944335129fad43a4943bb85be73276
DEPLOYED: 2026-05-08 01:52:59
LAST_TX: 2026-05-08 02:06:47
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Connection established. Peer count: 52. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x5acf. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 13 iterations. [TRACE] Return data: 0x56e9367a… [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 4%.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xc4ec7bb1c50d282a7b1ca4a4e6506d55a47f45e0 0xad3674d88b66d7be9cfedd7b838b6416cc684320 0x48741de89fdf22c9bc62cb83c1546030285c746e 0x0501b623ad4094c1979023ed7780a6a4fff1c175 0x93960b94c2ca7bffb5de43a7dc34e6047214fe3b 0xe264fe4116f30af85e39f6e832e776d7e8bd5abf 0x3ff0ad7f6bc5911ffeb93d6be97f9795296963c0 0xf7ef46bc4c1d498a2dc6f1741e079ef450d417c6 0x871b5f89c6c2a6a6e15a8ac5ef9e0a49009a4263 0xe439d54225fa20a66731f95e96d9156630c76891 0xefc07f239fe748617499a77e47da865321300a01 0xae38bb5e97e26f0c9b4634cf28b8b26483980824 0xbc1a47e8116323584b460f57e215719a8bd6807f 0xc8119cf005cd3d7de1c407a248066b6d9a9a6b4d 0xc2fc2d25f2653398db17c4a311997e592db983db 0x0bc422bd06be5a116bf9c20d80df47e0751cb8a6 0x00000000f3c6887fa69a9e4b5cf255d043ba7414 0x69eec4a18781163566bd9ce9ea3f3f7a7e9fe241 0x18ec006842f647b40a81353b3497d5f589e416ea 0x1f6ccb9eb6e801dc51544986a6cd5d1f31a1b7e4