30 Abr INTRUSION PATHWAY FOUND: Security Scan 0xe10cde9c80749f5a28dce0a4c4362650f1027f79: Potential Exploit via Debug Mode Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-35A0BB5DE7B0
|
Infrastructure Scan
ADDRESS: 0xe10cde9c80749f5a28dce0a4c4362650f1027f79
DEPLOYED: 2026-04-29 08:26:23
LAST_TX: 2026-04-30 08:14:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.28. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0xbe. [TRACE] Debug: 82ad5bfa11420435. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x28f4619ec68b64e4c5c95f02736141a36bf14e74 0x8be4a947ab5384421b4e96a8d7be7bcd196759be 0xa5342507aabb7557610d4618a10f4dcd04bb59e1 0x3a6d666514a3edaf3c999afc05ac2dbe3ac5b1e1 0x3901cd57eee2332e8ca2a70c255b544b89b519d0 0xa6e8451fde16655e3132d1806537b7f9f2cd2078 0xf162abfcbea8941fdbf96388f2169f739c878296 0xe143789ec1b080013de754b3a125cd013467c91d 0xd008c962ccdb73e3d20bae18ffd1450426d314d8 0x0a778f71c90bb38deaa3f399c4e9d8823db90cdb 0x6cb37053152e417e491aff79a632a2c52369a60e 0x0881bfff8a40cd3478645b79c20b7613664769ed 0x2b12bad12d2e181f49ca156615589b08d61e28ab 0x2c02ad05c8e794b861216948bc58bbbfcabd7035 0x176e51e43ea8de59eed6d6d578e959eac7b79a60 0xc0b88c1ca5a2669287c6559fb946fe999fe89155 0xf9008a5180c924aca9a2d01d5ea40fc6fb4e9523 0x56c76a1f72d7581741eda77bde4f7c4c4bbe8f06 0x6f0c7270007ea4300c600c457cde94b1194f6a55 0xa83ad10794c9c4221a8e829b35694222d605f5ee