INTRUSION PATHWAY FOUND: Security Scan 0x7d89cde2e38f514ae72ec89f7f336c696d35a512: Potential Exploit via Debug Mode Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-182F406013C8
|
Infrastructure Scan
ADDRESS: 0x7d89cde2e38f514ae72ec89f7f336c696d35a512
DEPLOYED: 2026-04-30 12:41:35
LAST_TX: 2026-05-02 04:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 7E7A1D6C. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xfd665e423500534af97a1b58cf7b3f31d094a78c. [TRACE] Call sequence: efe8 -> f745 -> 9e8a. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc375e51ceab7d893b0184215e99fe6273615b85 0x0ee345e92f06f9856cfee9be21559e1c7a33427e 0xceeb5df29b90fb161a228c8f1d36e2f6192d19e1 0x3882f2cc8a479a4b8a007ab0bba366cefc7f4c4f 0x14eab8e496a92c3f091629fbd7a58c9cc0a47265 0x3e4bfafb551205ec4ccf97d177472eecfb1c1cdd 0xad5a9f983a2071caaa02c9322451700674c41bc0 0xbea6611b57fa588d7179a2906c1281f414cc54c6 0xe357ddf7e9c17b25e7b8f5dcd9a98c42265d8e91 0x6c08ff10b67f0b17d8f2a7213755791e052859f3 0xe5ba854b91b6c607eb43d8d9c129566cdb4ffc17 0x29e485ce51a4df0b9f4e468855c1c9b4145bdee2 0x2010895d4c0cb73e4e320a913c805db27da4a57e 0x98c6747d6a4ffc3df311e82aa99f31c38397cf80 0x90734d4157b5cfb63db9d228f13130cc77979864 0xc504782170ef513a284ed147b99a0db1e64d1bf0 0x9a088ea8f973e2722f834a36569e6782278ca587 0x40140f2e05e0c234c0d1e4df8682228de37cb7e8 0xc57cd863db47048d2353aacd705fb674b243a6fd 0x1c1d0ff1a2e15ad86c16a6580dce594f9b86fa5b
adminkopisan
0