10 May EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x25ff290edb1c1837cde76a8db99f62be6e7d9aa9 Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BB2C517CFA13
|
Infrastructure Scan
ADDRESS: 0x25ff290edb1c1837cde76a8db99f62be6e7d9aa9
DEPLOYED: 2026-05-07 18:40:59
LAST_TX: 2026-05-10 12:17:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-8. [NET] Handshake with node 0xbdc68709 successful. [FETCH] Bytecode size: 9602 bytes. [SCAN] Analyzing visibility: 8 public, 6 private methods. [MEM] Stack depth: 4 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Gas used: 82842 units. Result: SUCCESS. [TRACE] Debug: 0f6313ff7bb37fd9. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3e968c97bd81b24fbcd961727d7d37e77ceb0c0d 0x483ed87a565cc95b3b7e3ba98099370ccc2f9af8 0xeff608e83b5bfb8f790e766aed0423d2a6f332b1 0x9005b3eb6caea77f42a58013dd127431b9eff172 0x95b8cc53e22dada9f462a57add729731faf28f03 0x8ca92093b226d7bd0b38b66264ce2efaafa3f835 0xac3ac31dd90e5e37c97167b2fa5e494ae6041ad3 0xa5d722da9c49b2e30ed262ef387d22f1fd3a2dbd 0x4158480edcab7688a2c92f28407e42085b5af8f8 0xa6a2acc3b870bef7df01c9c434edba5c069c2a45 0x1d5c13f2c214f0de36e81ab2dd1b159a2c060966 0x74d00d408b798816602388b56503f6227d538faa 0x771922ed1c6c18247d02f24f13ca6fef66f2bb35 0xf72820499e01d6d8002548cbf2dd949438f32989 0xc59ae18bdf93f444b1c496e9485ce0f93461faeb 0x8b7452f9ee297307860d3b661f4f17c9a0dc2f19 0x352dfe39e3c0ae4b431500909b91e3b58bd50a3b 0x05ce2ccaf74890705097c57b7886b2689963ac6d 0x7b7c4be04800e55e6a991a4484c8b0980af3b7cb 0x36090bede6083025603dd1a4f4ed900432e17d42