LOGIC DISCOVERY ALERT: Technical Discovery 0xffb60652b4c5bca2fba27962cc80b98d3387b80c: Exposed Debugging Logic
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A66F0C7D1EC6
|
Infrastructure Scan
ADDRESS: 0xffb60652b4c5bca2fba27962cc80b98d3387b80c
DEPLOYED: 2026-04-25 07:34:11
LAST_TX: 2026-05-01 02:46:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 7.34 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x88e8449d in memory heap. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Simulation completed. No state corruption detected. [TRACE] Return data: 0x961dfc07… [VALID] Signature verification: 0x78e412e4b94066f563857216403e55210917355c67d65af27da70e97504d01ee. [DONE] Log signature: aa0e9a09ff9eb61100caea08f4e1af828b95bc51ce17144e1a84476fe46bf481.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfaa47d55b3e4e1ae7215be39387a32b1894b3cb3 0x0a2a123bbb17d620f7112c0c0318779c29e1c0ec 0x542f003393939bcd1a01509cd4d52f05ea224ad0 0x2c69a0ca601adaa179be9e917a3c8476f154e4a6 0xac5ec5caae727194db2524d3e72b9663def0c7d4 0x38fc1ed8acb7a7477ca49d8067ef8e2c570c7d13 0xa1df7c89b107a223a6b4c513d3b5e2f85a13fb74 0x24850a22653e3bbcff2200e5adcf1bc5568b033c 0x56b8fa76e48014420133ef7e074a773363b5bd3e 0xbf9ed9009fd581cf5cb151253eb27b66631b0f3d 0xcdd790169881019b753249c6e1e5acc0de0c87d3 0x558c0b2a2979c536bccafbd6b6c2160a043c2d28 0xf3929746b2b8ca9b5dd39bc9e6f322cf5b0157d8 0x6f1d0eebc3a2360ab83e2927bac7a8c84bb83a0a 0xbd513f8747e3183ec04ea4781e3c90d32e02855a 0x121ff042ecab71cec12be20cdf9456a72a0afd04 0x33a4e5882806979c7b8fd895e6698903b48eeab3 0x4cb98f9f7918158835814bf130180cb07ebcc768 0x580a86c65289448973d9cea7829b46f1d50eca4e 0x5f261b64af71ac193b4349b640152db0c4eac226
adminkopisan
0