DEEP SYSTEM VULNERABILITY: Deep Audit 0x22bbfe5d6b02689d07060ea3d97f8a99de903a42: Maintenance Debugging Left Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3D47625F787D
|
Infrastructure Scan
ADDRESS: 0x22bbfe5d6b02689d07060ea3d97f8a99de903a42
DEPLOYED: 2026-05-01 10:54:11
LAST_TX: 2026-05-01 11:04:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 11. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xe338. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 7801… [TRACE] Call sequence: 6e87 -> ca32 -> 8c71. [VALID] Finalizing audit report for 0x22bbfe5d6b02689d07060ea3d97f8a99de903a42. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x369fe3e9b0ccc2064ae68cd0c43437b6f60f1e25 0x61260006aaca11051da9a0b2b81ebf5eed57ec0f 0x2f27e83b5e1e642f4085314c102fb559f0e732c4 0xe85d7f02478b3c8988344dddd0115ba0e15dd8df 0xeb3f9663319aa494c6dad7731555d1a9d0ec6b46 0x5c3bc1bdd0d2b57baf91091e53473bb5b16d7095 0x8757dbb6d14915b0d7f87aeba7fc38ff7ed68c2e 0xe743d850ab207d9d0a43ec443011144383ec415d 0x302641d68ac385f42d6e097c01c6880760752823 0x8e573e4e8a9c4b71a11768f933f95b289a96fd54 0x14202601d68781a6e5993462a2c5e1482d2121e9 0x002d0ef793eebfe52461939d56f28ec0dd100596 0x636f7c2a3fd71336ab38258467b2b7c95e6d6c55 0x3ffcab9f8a4ebab776a3878a1393b7d3128bc092 0x73c74c3240c5a29280928bb3ebb2f81fcda573f7 0x1815c5c22234ca93a4065b37817b3591b6d5e3c9 0x13aa2606cfb235ca0d2e0d4d9beaaa30b0376036 0x915b2312d4cf3296430ac82cea90d256c0a5ef5a 0x51a0aca2d12ff32e49918e4a480561416f1f7a17 0x241575d6a96e5ea51f3c4b5ecdaae758c1d65ead