03 Mag EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x80339d73e4bacea992807f657a9fb7b7664d8284 Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1855CCD5CEB8
|
Infrastructure Scan
ADDRESS: 0x80339d73e4bacea992807f657a9fb7b7664d8284
DEPLOYED: 2026-05-01 14:32:11
LAST_TX: 2026-05-03 15:00:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 9 public, 2 private methods. [MEM] Garbage collector: 0.16ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 78% coverage. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘4b608f40472bb786b34fe32755a2f3c84cdb17ec61f7ffe56880a09a8b286667’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa95da3a380db95f123c6b674f701b780c3166892 0xdc750726062bfefb42b514322c525035c74a216d 0x9f137c68c51b04eb667924dfb9df828449853220 0xce750f9cc021ce602e38a4e284ddd9e9141b8937 0x09d0e4e0eaf60df830403ea2ab218c7cc36ba2b6 0xdc51f02a9cb9b78107e02202b7a73035659df4d8 0xd902b5c2b81425f14c2a8d931147a43064b618f8 0xbb8a62602a501d9e8ca7bd2c38693ef03711c800 0x4cc9341c6687b316faace130783df0757faaf8fa 0xeb3f9663319aa494c6dad7731555d1a9d0ec6b46 0x6ec00f4cb705f95770b9a66c78335634a9a63588 0x200a9bcf098d04ecfa012d7133c2e5561e56e54e 0x607b5431c8701db5a4971104eac2d453867ba4a3 0xba77c82c1750e3273c2e6b24cec4644dbb4001f1 0x662f8c87f5325898b63a2ecd40a94b123e904797 0xe8807f708b87096bad30ed508fb9975c0b24d8b3 0xe2f4018c1798bf0f2049e685dfaf469d1051a5b9 0x19e004140c96106adc02d3f139eca7e3ed5242fb 0x1125eed321a48ad48c4a8fbd8a6bad538bb85780 0x537b6cb6722383b1be38706ac2cedd6579fa64a3