EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a Contract
Rédigé le
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC8F4085EFD9
|
Infrastructure Scan
ADDRESS: 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a
DEPLOYED: 2026-05-02 10:32:11
LAST_TX: 2026-05-02 10:59:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 7aa696fa…72003aab… [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-E5130D22.log. [VALID] Gas optimization score: 78/100. $line = str_replace(‘0xf8ff86b68cb81fd49e346d9664ea1c877cfe28d7’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6538081dc414b1fdc4d3e8c30492913284fe1984 0x8372a16138c66580aa97d7c012fe2cb66323f447 0x6b4e67634d030751da67d477f1c244f5ba60ba15 0xca4096e7c63a596dfb92dbb3eb9b09e1e71a3271 0x764263e328f1c6032383c26cd8a829f306322517 0x8e68dfeadaf2877804f8930c21dc5f64dcb88c12 0xdc462d8bcd7daef4d7315829e47d95ef1db8b2a9 0x52edcfbc48af1b74bbf1a476c347aa97c6dc84a0 0x7e4d2046bc47b6b5a87bf441db87af344af92065 0x9437c0aa66c8eabee4f227c13795ada36242d7a4 0x8f129570d6f928b28a31d31948454fc8be0d997d 0x05df24bc2bfbaa1f02b9599ac271919b8ebb8951 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0x2f8868b581d9df685fe80be0be2211319a80fc39 0xd78abd9d62dc07cead76a2d6cd7081eceaba1ea7 0x9d6f8e5ae4b2d7468baaadfb5562c7ae1e268068 0xf7cfde28dc6f1749e102cbc0de5a6602e4938574 0xaed3610872ce43dc7ef26003c851dcc23a654f26 0x27046e373dd90ccfc5e3f05e0907b242a1797be4 0x06889274cbe92841f7a38a5e8af37496a9664da6
