ATTACK VECTOR MAPPED: Vulnerability Map 0x50f0a4bcb928bc67528089029b5e0ae639d982f1: Active Debugging Permissions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DA41E4D21AFF
|
Infrastructure Scan
ADDRESS: 0x50f0a4bcb928bc67528089029b5e0ae639d982f1
DEPLOYED: 2026-04-28 12:29:11
LAST_TX: 2026-04-29 18:38:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 2.18 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 4.28 ETH. [TRACE] Execution path: 88% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf07e026de1224d5469f9dbab183dd5041eef9c17 0xef11c1f5a51ac5e2f35f3fcf6c1aef1eb92a3b3f 0xf8f85607b9f45ad475381990e52add688c751e91 0xff22d044ec19d47ba8349e7b93ccc1d3a85bab80 0x8c8b79d97653031e5b80b0ee79264057e4dad4db 0xdece6ef98092ca5dd61a774d65b8d60292250605 0xee8ee41df65b17ee5bc57900968a4445d5a62202 0x6cff969bcbfef61f0657c78cfa20dc1a0806743e 0x0dce4caccf15973221618e4c017cd45d0d4c412b 0x8baac99b263f91a1eb296ee7e679b4a2a898fb42 0xc14f9309f7d6101b1d4d0478d2527c60d2810230 0x7c3e832ad3317b669086b9f6bdbcc4258fc59342 0x0852f1a63e929e8c299f9b188a9c24d51f669384 0xad8802f82da88ed98b2e2ec102e8ff1319c43724 0x650c2a61855c544516f4fdf80e35662ee00eb5ea 0xdc5f56418a7729202202ee10706b2f1733ea2424 0xdbefcfd371601d4373bf7e712b3900f3d8eb2c91 0xcabb37a4e82d22c75d2e661cabf2b1ddae50a54b 0x44b7d9244f179c4349f30dadcd6ac35952823971 0xb385133c41540806ad80aa4baecbb40a66cd3779

Leave a Reply