PRIVILEGE ESCALATION ALERT: 0x6942046de48f400fc800003a8611ca00e38ce121 :: Administrative Vulnerability: Debug Entry Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-00D05035FF2A
|
Infrastructure Scan
ADDRESS: 0x6942046de48f400fc800003a8611ca00e38ce121
DEPLOYED: 2026-05-13 14:23:23
LAST_TX: 2026-05-13 17:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 43 segments of contract data. [SCAN] Identifying function signatures (0x645f5a88). [MEM] Stack depth: 9 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 8dab -> 9612 -> 972f. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb3f98abc17edadc729c072ea823a3f058ae17d80 0xf354badf312072c35ef4f19d5e38b03d2b23420e 0xeb28618230a870ce17102fbe7d75d79ae7d5fa91 0x1e8a9cc464f846860b7a870f21c11bc7bdd6a506 0xedec2f7860064ef6b4c9b8fe2167059dfcc6f5ce 0x018ea8d2f38f696b2d201a01e5cd04f6272742b7 0xa4e9aeaf2a52199f39c0ea04ae7a37bc8f62e2d9 0x0a4b499bfea1f9cd463b75e3561d13a67483e753 0x516d16114ea66bdd41a73f46b86a27ebb3de85e7 0x2ede6bb35eeff2ea1338fbc4183689359cbd5cb8 0xe4ae517f50d26286a515f4342b7fcdbc23899935 0x7c14a16ec194b64ed2c547a5208b912b219d922a 0x7c6aa3ee8d7bcdcb39eb7a03fe3e7af3375d7d7f 0xb92332166bf1aec8e952a34f9a61f65eee1d838e 0xac0718e9db8dee28d0bcad903050d4db9d305f0b 0x7f24e00acdd81e8b14ce64111c94be9e1c912365 0x465b0a52c51d1a0571849ce6ad370b60b9a93425 0x2a6c51e418b7593d49d27dc2a96a82fd0c170aa7 0x9ab65a9254a2802eb93e30f72873e8af694c3758 0x9c48a0fbd804d638e60f324833eb7ed6dea09328