ATTACK VECTOR MAPPED: Vulnerability Map 0xae02bfaeaa5613225fb287cdca8ff3ba6c6a5fd4: Active Debugging Permissions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-935E959BF9EB
|
Infrastructure Scan
ADDRESS: 0xae02bfaeaa5613225fb287cdca8ff3ba6c6a5fd4
DEPLOYED: 2026-05-13 19:48:23
LAST_TX: 2026-05-13 20:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 11a925d6…aca0e0fd… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x3d. [TRACE] Execution path: 23% coverage. [VALID] Signature verification: 0x5cceaed254c5ba80fee6646cbdea13c6f641c1fce2dbfb0ffb1c5ed282cbda24. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc37dc049196dbdd2d3443fb6a1c164d0a864ae0e 0x9c8d82de5af9933f34853ef4a391fc0efefa7a0e 0x8c162771ee30286a5889d79c234ead6f4c8bf0d5 0x08ba150b3d226d4382756b468846e53c8314d8ad 0x434a85a48ec738472025a1ecfbfbc6d5adc9ddc1 0x8d957884d94b42a1ebb3c1160d26d0f467b73b59 0xfcefac90d5cbcf75abe5e5cf295152db3c3b1de5 0xb375b7fdf684437fba030d36d36efd7f047b9357 0x13218e3ee786132dfc3d514596bbe0d6cd5dd9c1 0xeb69efdeb9da9f41fb72d5e1df653a08bc88d21a 0x90eb63eabee8a8db56d43fca248becbcef9832d5 0x57af42fa2e337cf215ffea18cbafeb2575dfc54a 0x097488f16cfb251dd51410dc34d14105a884a060 0x5073f457ff3f8645855bcc6152a38d692e3d2845 0x32126612ee3fbcc6501a9efdc892b3163bee2984 0xbc4b0524aceef28f1b5b6259dc2f67f94b7cd86d 0x77e675da7529614de685ab36929643caf99807c7 0xbfb71ddd3055a01cc2ee8ba37237ec1f9b0c225c 0xd7120ce782a03017b0836eaad4cf9c6a38696ae3 0x5c00087e1bef8ced5e8cf0c18d641f03cd34f8eb