ACCESS VIOLATION: Audit Summary 0xdec4ab988e80e4cbcd245ab4702705815785ae63: Accessible Debugging Interface
Rédigé le
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD4A1E11BE1B
|
Infrastructure Scan
ADDRESS: 0xdec4ab988e80e4cbcd245ab4702705815785ae63
DEPLOYED: 2026-04-22 19:07:11
LAST_TX: 2026-04-24 11:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0xec18edeb successful. [FETCH] Entry point found at offset 0x0fba. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 2 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 86. [SIM] Reverting transaction at PC: 6399… [TRACE] Return data: 0x490d5299… [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task C9197AA3 finished in 82s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x07ff708c4898a21ed239b1a831a1b1649d38a4b0 0x52a02cc34cca4647a87fdc3980843feaa1d60d62 0x61aab60d8ffeba871041806c4b21849b9f2043e8 0xd70cbc8ab23990cab77402101ff20e2d0249cff6 0x9552f7cf05b70fcf9696e4b85b244e1c31998d65 0x18dcc77c00dedf3effdbfd31499f713939a74e48 0x34bd33ced9acd1bb71f9350b3fe2455caac6c559 0xd1b50918aa2e34b89a89b23c84d2377f1622d0f6 0x28a0920d5f06c40b9aaa3f939be1ccd2f286ad70 0xab4a50d0980d94d8a934727b4ff5b74607d144f8 0xd0389df4827432a0f204886734d1e6c2ec6738a5 0xd816b77bc4a8893daae26bae79d8f0bbd71ca514 0x15939ff561a3d642b5d08d47bb3a03a344835ba0 0xf36582b1c8bea3f03b6b8f587c988e592527689c 0xccf315a28422eaa389c3eacc5632a905bbfaebf0 0xad170c2cd4f2919642ec85a76dc097ed07d58fec 0x4bbb605fcc745bfcffc76627f2492fa0aa3c7b37 0x8a7b1e4cb96b93e9beee77927313779f5ed35f92 0x5b0005d28d437c8052c7b7d5cf41c0051898e3e9 0x032a35dada672b394525881f789a3b4e7734c76c
