TECHNICAL EXPOSURE: 0x0cbd477178fa8e05d7163b0218e8fc0a42854d09 :: Technical Exposure: Debug Mode Logic Found
Byadmin
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1FB393512111
|
Infrastructure Scan
ADDRESS: 0x0cbd477178fa8e05d7163b0218e8fc0a42854d09
DEPLOYED: 2026-04-26 10:50:23
LAST_TX: 2026-04-26 20:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 33 segments of contract data. [SCAN] Detecting compiler version: v0.8.83. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 35 iterations. [TRACE] Debug: febeb0f529475f4d. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbfb86f7fce6bd6c541df4c7f467218ae56fb355a 0x778b642f99d1b85226ea42e8befc028f4f6e3097 0xb4f81d0e016b7470b414523322b0385c25a29557 0x509455230fda6ff04cf4d4830733470eed9c6583 0xcee8387f12e85f36f1c3499f41d77d57aad9c195 0xba35bd6c6ac6a1b9ba1d5c2ec5e7ea7feb53a7ca 0x77228b6d03c0603872deda7c8fe5e175cfe44751 0x53ddde263c44ce12e7996955bf935328bd2a8647 0x823d2522b04b5a555e3f9a4ba42932183e2b89d4 0x7879efdbed8deee99f8437be012c38675e74f757 0x932473c1fe5904107bd05787b53513423b4860fd 0x20546a694a662bdcd54ac095db0ca6a55ed9582f 0xf3d96423119e628c8c81d44ed1ec4dc1017a0d87 0x4bef3893ee386e710312384e3c7146dc65bded4b 0x111baf6698bd1db3ac60843f3c4eea2446985ead 0xb4610b34ca99fa8c48844faa667fae1686a4a2aa 0x7ac0bc82a0c33758b4bf0ff693e0f1f1ad85684c 0x9c628835925a7d6247e395f95651397bd686e864 0x21d616977f355afd0eab7a1d11c9fd58c8579115 0x9224d9363271203fe3250bee4eb4c4bb7e4513b2