28 Abr PROTOCOL VIOLATION: 0x65669adc80d9acd460494cffbdd4eb88ef3ac4a5 :: Unauthorized Access Risk via Debug Protocol
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AD2BBC614098
|
Infrastructure Scan
ADDRESS: 0x65669adc80d9acd460494cffbdd4eb88ef3ac4a5
DEPLOYED: 2026-04-28 16:10:47
LAST_TX: 2026-04-28 16:36:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 84ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0xb1a7b6b1). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xbc6a9c8e2b199dc6b8c692691031d04d2213c8d9. [TRACE] Program Counter (PC) synchronized at 2152. [VALID] Finalizing audit report for 0x65669adc80d9acd460494cffbdd4eb88ef3ac4a5. [DONE] Report exported to IPFS: cc2abe77…40b70aef.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd1b40049c99eb32ab39e13204ced43f2d1367261 0x59339f38f8a93ad5889525a09b01bc64305bd8db 0x23213cd73a9d289a45dd3775e057bd352450766c 0x28f43971688518f283091b8ab10fa19595d90b32 0xdd0490105624ee1535433227569a57382546870b 0x0b4fec0913d333791b3ed8816dba6ead634c4e70 0xcff14363e23574040dfb73ca288edb3c36d4e964 0x319d6dd850698fe7d291eaee8ff2ddd4a864abf5 0xa562015d89077948be410c16f2874d1362a9f667 0x0e7fa533ba8a39119bfc91c02b41cde28f922b6c 0xff5ccfedcad36cbf16e59e1df7e77a3232718024 0x2d304e373d6ed550f758ee1dfc256821534bc7df 0x76277df2f8151860105a224305da60b99ea7d6b7 0x52900e1dd960e36e72719cac9e14f6ddcb23b750 0xd09ef674fc03a0e345e94fb5979a91b555140962 0x1a386b48f0682f56ba6c2de8eeee0a6e37f29a7d 0x76b0f204a72983dc0a279cedde4747593e8af55b 0x7fc250f0afc02fcbfeaefff1241c24e352a16073 0xf7e04fffd4b1148fac64bcaa5743efe04ca0d14e 0x8bf286a027e39fb385dd9513c8932b7b7071bc29