NETWORK COMPROMISE: 0xed8bbd662b62461c020172dc99e92e03398be1d5 :: Insecure Deployment State: Debug Access Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EA2E8E90FB99
|
Infrastructure Scan
ADDRESS: 0xed8bbd662b62461c020172dc99e92e03398be1d5
DEPLOYED: 2026-05-02 16:21:47
LAST_TX: 2026-05-02 16:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 59. [FETCH] Hex dump completed. Entropy: 9.22 bit/byte. [SCAN] Analyzing visibility: 6 public, 6 private methods. [MEM] Tracking pointer 0xf74c41fb in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 7100… [TRACE] Bytecode segment 0x78 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 998471bd66a2ff56b6ecd33c5741b7a5d4a46e5146bc00cd35aacbdd410d065d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x54bb5b4b9c47c0dbb4fd226309c65ee75c70e0d3 0xdeffeef61921caab6ade230836f4af2418e9d33f 0xc801071c8760c464c38bc316b22d5c2a44af01b2 0xe8c9c21dce0fad11b3a802fa6dd24ae7a70ee9b8 0x3d8bec4ad91d54517d80ac06140310c6d8d5c6b8 0x0b7dfec17eb5fe1ef7fbaef454d70769bba2020d 0x3bb2c3b044329506d45f0258325d59c557afeee0 0x0c5c8300e7d6d83efecd1221a589f049a762a112 0x39053a9bb274adde54fb57e8bbc25323482e7cca 0x6d801614660e6bbe01320b02b5c2b8fb9cff7b57 0xe5c08c938a0f9ac90a7f7e881b4fb21905ecd6d1 0x914b39fa38f74e79d6c13492f38eb9ab6dd4ff91 0xf6879e2cc40fddab4768a965822cc203282b0395 0xf854be96ed7450d33b979e89dd0ad9e878af0f7c 0x35c4201153e15837ed2558b5ffe339ac8c5004a1 0xbd9ce4357e5a15cc7538b64ecc77d659f3de90d2 0x9529182f67ca6c7c08835325a76a840bbe072c68 0x24c98013f53b4f2f4eb1dc897bbcc3bb4c19ec98 0x211aeb14a1c38a599faf6de6ab45dbe2a8bee74a 0x0c34317291893b92eb51c9d2bc6d71de75e853c4
adminkopisan
0