10 Mai EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0xdbfbabaaf97aac345a7decf057495f0b80889b7f Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8ECD366CDEF
|
Infrastructure Scan
ADDRESS: 0xdbfbabaaf97aac345a7decf057495f0b80889b7f
DEPLOYED: 2026-05-10 08:46:35
LAST_TX: 2026-05-10 10:33:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 8801 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 7 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: 89061b4b35b86b09. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task D7900857 finished in 41s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd9cc7e14a9d037869bd0023e84757c6062426f7e 0x35830dcc18fc5626c330c31667f948691bbf7c0a 0xb02a48e69951c36896c9ac6df307f3a3ef4192fb 0x1430def6dfc5fb01e35fd03d1693e26ea0f96c93 0xfc1ea7641be80103c9708a7ad26099134df9f860 0xaa23c17a27342ffd252f2082c4f93f260f7a58ca 0x82e6ae83f872c12d9117d710eb5a2924ddbc69fe 0x2b7b410a00bfecbf42741c3a289208752824d8d0 0x668c659b9b124c406c2ad5d216ab62f3bc1fb6b1 0xb78486a570a39934bdf0d1dc1db7233208171e0a 0x93dce9e79d4b6d18d8f19c4dbf337148667290c8 0x6912994dc2d2b760b543f086ab7c608c3254f4d9 0xcb42fee598be97fe7d978410a7808700518da9eb 0x616105078a18b365985f6b131f25389b5d479236 0xa9529b08b80053229d6dd6a0af5215a88bb1330c 0x9d9280fa9b1484f93f0fc9daa9f6df75c9ddc9f3 0x6426a3e5f7851bc809e77d8b9e98539c75424a5f 0xccf395c4af91df88cb6b43b0bbb70198c37e14dc 0x7571cc86d756e17e3b72760bad5bbfa5731db235 0x7e1b39c7ce31fa30a62e729802af89f9a915632c