Published in:
Blog
PROTOCOL VIOLATION: 0xd08332cb1390043fd766eac8d63054fae0ccea95 :: Unauthorized Access Risk via Debug Protocol
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DC8172A4D50D
|
Infrastructure Scan
ADDRESS: 0xd08332cb1390043fd766eac8d63054fae0ccea95
DEPLOYED: 2026-04-29 11:39:59
LAST_TX: 2026-04-29 12:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 6 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 8817… [TRACE] Return data: 0xcdac0eec… [VALID] No critical memory leaks during simulation. [DONE] Scan task F3EB87B6 finished in 48s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c8b79d97653031e5b80b0ee79264057e4dad4db 0x34a5c20f2651176318573dee34680ff31bdfbe49 0xa2853602c916f420203231c7aebe57a638830de6 0x4aaf62afbf1aee43df0f956abf8abf261e71d412 0x4cbbf1c08a7eb038841204bda5517e64ceef5911 0xc3d2babeed825f9f0a7ae67074b6cbffbb6cd996 0x093a029c41130a55bbb278eb9d35327b32c3952e 0x7790a0d62b3486eaf8a9f3cd54f917b8dc98e272 0x24e115cfaf247528068bbe3329eba2ee4bf6a32a 0x2c5da6ada2d0fcfd78866821b11520f6a262d86d 0xe18fce011341868041e025c60912591700a04b0d 0x765fd44be94c3e9c4e369c1e2aa1799e9c1500b2 0x5924ab31e687d584faf9cf15e5b9dfd1b0246e9f 0xcaacc2a19a0e6d202194bdef1202dbc0d7405bb3 0x2f62fe8ea83c6d349bdc9c29ba4ac1cf7bd3c3ca 0x7e619b7c8ca095e397db1651da2d9c044f8fa69c 0xc0672a6c5fefd93b872f9b2a71e721b27b3004e5 0xa1682efb675cbd3d5aec4aff056b344d02e48642 0x264bfc6130871ba1e23b8c1a8d7424ec8ed3cc0b 0xd95a0f878d3a759d385c9cf5217b0dcb51dd27c2