ATTACK VECTOR MAPPED: Vulnerability Map 0x654ce74b131c969656374e9f863931b155e17a4a: Active Debugging Permissions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2EDB79EA7E30
|
Infrastructure Scan
ADDRESS: 0x654ce74b131c969656374e9f863931b155e17a4a
DEPLOYED: 2026-05-06 12:20:59
LAST_TX: 2026-05-06 12:56:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 540CDBBA. [NET] Handshake with node 0x9c9f8634 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 43. [SIM] Fuzzing input data for 32 iterations. [TRACE] Return data: 0xbba7898e… [VALID] Consensus reached on node cluster: 2/10. [DONE] Log signature: 341f8a6ebb02f7b03c460c8fad17b94035024ffcadfe2458399556349e584111.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3a41d5c92054ab3ba4cde69718ad161215f63578 0x21acfe82e63074eeafdf5f029aa2003c36efc314 0xc7c0bee41b7e5559d8e04c3c409ad896bcf45b2d 0x5ea32b4a6b8c1b80eae9525a71dec314cf8f40d2 0xb5cd5c194bb70e61ba45f892a88e9f518e2fbe12 0x0e2b960e97f3e1720c37ffaaa3b132b2dcc914bd 0x878dbaee502ffc58630ddf4fc6cfd99a8fd39b87 0x7f16a669c93d8fa6dec2edebe7688bf549c62081 0xc52898450e751b4c230d1e302eb6e956f47b3db2 0xf4757836142a4b58f644c10d175b759926b6a81e 0xbfb719ce812fecaef594c8b5f1373c4e86e03426 0x0bfeba626cb4186e804338bb7dfaddc3451ec533 0x07b3ad0900dbb7cf515f58de0d9e59eaa2353564 0xa78846573c4eda142dfe10335f560a5cf3486894 0xa627ef2c084d90b868e698890f79dbca5a3dc6a6 0xc4e4e75fde67ca84b97d20bef43b37d4d356d16d 0x881a493da15756a609219df13ab4861cccf710c4 0x33a7064d42bc0392bff9fd75810e57f45867571d 0xb821d04f1fd49851e3adc89505e10241f8a01a4c 0x5508bd97f0caca94f612e156cb11a1d616d5f235
admin
0