14 May PRIVILEGE ESCALATION ALERT: 0xbce14836667cf99f57dba141d4aefcd8f635f041 :: Administrative Vulnerability: Debug Entry Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AA3367801912
|
Infrastructure Scan
ADDRESS: 0xbce14836667cf99f57dba141d4aefcd8f635f041
DEPLOYED: 2026-05-13 23:51:35
LAST_TX: 2026-05-14 00:43:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Synchronizing with block height 67433. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.17ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 27% coverage. [VALID] Finalizing audit report for 0xbce14836667cf99f57dba141d4aefcd8f635f041. $line = str_replace(‘FD8FBEFE’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a8920f08d152307216df4a0bda51215570ea11f 0x3fc6e6f119351e2cd827955ec75e8668e66ca37b 0xbf435305235ea6d948650b0241692aae886c9f35 0x25e829673a4727254587a6169f18b7d2dcc15a9e 0x1eda7c64527656a2ac526ace890929fdcc5af6df 0xeb939ed3ff0e4d070ebc5895dccc1a68985dd677 0x57161997d2b343e5059791c633cddc65a9bcd928 0x3e1ffd492aecf4674ef733341aeb15ea43f7a42d 0x7aefe99a0d71e33cc2c07fd4a951890a2103570e 0xf72d2c71245da76221f822933338ad323d8bcd95 0x5933108a4eff62294b14e6dd49d0cf9f255e2ee5 0xed03b32f506edce7cd961ee22fab91fd015fe2a9 0xd645c6f74019e9fcb3684a895e2f7dd01df887bd 0xb4767d8b734a8ba2ca30a22ddb5254a46ebb8781 0xa8b1e768ab237ba2eebc2e418633372cd4d03ffc 0xcdc3d236837b4e56ce7b3864beea286c38c0d6a7 0x9fb3976425f6ca16386dd1c32a40f013065176ad 0x6561f3da64ce0335c4f9dda54b3d0b216e61f76e 0xd6f811955ff89eb14b0e0d5f058a8b30d0bf4781 0x175f2ae0997fd06c262441d6f86a2ad6c8d68097