PROTOCOL VIOLATION: 0x9751beb96f76dd06d60e50bfb3161b1361fc4c45 :: Unauthorized Access Risk via Debug Protocol
Rédigé le
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-14CCF61D587E
|
Infrastructure Scan
ADDRESS: 0x9751beb96f76dd06d60e50bfb3161b1361fc4c45
DEPLOYED: 2026-05-05 21:37:23
LAST_TX: 2026-05-05 21:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x7878. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-AE2FBF0C.log. [VALID] No critical memory leaks during simulation. $line = str_replace(’83e1f787…c1c2e7a0′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x89686cd7c4a6c20ffc80032557afb12a539df19c 0x8daa1b35cc805c418860b87ba39a1e568e7da3af 0x98bb544a6dcfb57edefda704681d2fba53762171 0xf193db84e9c45f6332acdd0d5df4e41dd0e19c87 0x38bca071c35f302b9eeef86b2e1ec97ea6eb039a 0x29e75bb6a2e4896837f92b5cf77e8a1eb98ba8ea 0xf90e758b07e68935e668f3c3fa8a63c751f69810 0xc360e625f19a7ea47e47810b13e386221d5187d1 0xa61b19c66f998019bf23792c2821ff8a994fe162 0xcd4ca2558b0de0d70d26cfe8c2f9a582431ac0e1 0x53e15ca37e707d08fee69af3236166577459d902 0xd56ebe3754fa6ebfda7e3dd569bbe10c1eae578c 0x50969688570663a7fcadcdf6c8b856adda9a6126 0x55bda6ca31d495777d2c1b3114701bc1ad893e6a 0x4e8185d58821d92d535c215f964caf194687b76c 0x739a133c59fc4da1a85683694cac1e731e1c10f5 0x0b7e3d7a0cec3b28dbb84cf13fd01cc855a42a4f 0x35ebde5ae169a5d656b0347d643dbc2e58c1d60a 0xa0bb291bf499b66443583ca200fcbfb1057cafda 0xacf9dee96ffe6fa1fb96e43ce16e8d05b2b20804
