EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0xd55d4c17c72a27da537e2102da675b263212881a Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-24ACFA1B0C07
|
Infrastructure Scan
ADDRESS: 0xd55d4c17c72a27da537e2102da675b263212881a
DEPLOYED: 2026-05-13 13:37:11
LAST_TX: 2026-05-14 00:52:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 7210 bytes. [SCAN] Analyzing visibility: 9 public, 6 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 1705… [TRACE] Return data: 0xfbb42a56… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘475c755a…00b887e3’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x180ae5ec89dccb3b27a4f577361dd9ac905cf820 0x882125fbc668b4f98bb895ab0100d612db773e97 0xa7122c326a8b9cf133496f907d70d68d4e2fdd02 0x3c6705f02d06e3c6e22f4720e8f2928709f36926 0x42ea15987d20663e5ba6c3de70c85edc5c049f3e 0xb858c9b174c4ad56547d109ec4c753cbad0e735f 0x2ef3deb6bccb97c8f77362df455b602c7f539201 0x6e87ca2221ef9efe9d65eb9a57cc5244a3d672b9 0x9e264b79f8a600f0d711c821184204c56af969df 0x837045399d5bb6dc69955bde0383ca1b3583ed64 0x6128d25c1962281672ed9e1584282fa7178586a2 0x6bf7b938e2ebe4671e6da22f35eaf0c607a362d4 0xc95428c678efe71312ae9f219ead698d0f9cc60d 0xe12e1101f953f64dd8b05a0481aee6d236310a88 0xdba838b35bfdc00b872e8bb9945706b4a0663a0a 0x0deebee57303df65159e835eae756dd4c113f065 0x0252cd454ae0f2630ac391056e01f4763f0be168 0x9176a6f165dcd42d13e916d8ad5f7bc24e6bc89d 0x56a479361c96d5cdae674c0f032872a87c0b82fd 0xee9d1247162b35b557abb2465d0626c1231c8751