EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-53AACDE33ABD
|
Infrastructure Scan
ADDRESS: 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c
DEPLOYED: 2026-05-01 08:00:59
LAST_TX: 2026-05-06 11:52:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): 63d0e007…94793934… [SCAN] Detecting compiler version: v0.8.33. [MEM] Virtual memory mapped: 0x0000 -> 0x148e. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 9353 -> 8d0f -> 82b5. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x03f6e238c76810657a039a4a9b202b83ccdd0153 0x4e8e432beda46337b10357052a5a74b1828b0975 0x1d0a6f7040dc78e87d97a6e5cec0fad402f3ba74 0xfe81cd38825566a0a13aeebc9a405e80d662b790 0x3f64e39b9b413f66c3ae712edd4d1d14ceba4602 0xd03d38c78ac1b5f5b5209cdecf8868453d989fb3 0x9f4c3bd16692eae3642fa630c975743f0d8a7f85 0x9bccd34b20a161848f0df1179f35eb14953fd103 0xd1f960d47b93419ca88b038680d0b8e03ccbeede 0x1b8ec7663d3da0e18dfdcbae91464349b88557a9 0x15e5eae530cec1b8da15465ad1934014ba73419c 0x8599a909f7e97c4251563fdcf67c6581ef0634d1 0x3b54f1963d4d58043a091261b9ba02b7b8ada758 0x077f8c41cf693f6e20544cc0b1321beed0a1a68e 0xe08eeabdcad05d3439ddcc62c3e86ac8bf110b5d 0xfc1348acecb95061425f02ddb8fd5c85ffa9ed6f 0x60c7ae1699037aba5972db8932493288f47055bb 0x9e7b9f6560e16b37d38a5a9eb8a55412988a132b 0x371824a3632fe61d0a21d7d68d600b46eafbc4b5 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a
