DEEP SYSTEM VULNERABILITY: Deep Audit 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622: Maintenance Debugging Left Exposed
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D364DAED7C6
|
Infrastructure Scan
ADDRESS: 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622
DEPLOYED: 2026-05-05 00:28:11
LAST_TX: 2026-05-05 01:19:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x9a40f2bccd543a5eaaaca3a5749d912087ef6622… [FETCH] Bytecode size: 8201 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 33 iterations. [TRACE] Stack trace saved to /logs/TRD-88A54314.log. [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xecf2bcf8f247b6191c159b98447df802ab047c13 0xb4de7507433c8c9109426d7467ad320563ae4a71 0x2ccb0498b3c3b86e73974a2d12e328fe06486b63 0x66ac808c455b72c349fb429d197b7c89ae297862 0xcdd3b271e754d813aeefabb4349d9416210db66b 0x00e8e5bebb78af9908a006b4af8ebcf72b9e995d 0x08101df48dbadf58baecb66708f063c124134ad1 0xfd5fd0c3ba306de1a56e347b4a049d11763f5d47 0x3133441bb58d2efdfdf35f8dc244db5a22dc21c2 0x6f1835664ed34011d61309168415d67bf300edba 0x02b2d4c6864813e6aa24ea3db78ec91cb965bfa0 0x22a4bf3c3bb1d2c08ebec8e49154592ac423bad7 0xfbc40d4bb66ed96578fdbdc411c84cddf27c7879 0xfeb4bdcd42dcd6c89af7d00bd99a63c63008562b 0xf8ae4b620cd5b7685cefa76b06eac74f35fdbd97 0xdc70073c061996aa3fb2cc432c0f11664547df8d 0xe0ed0cff84adae9b25f628b3ba74a0adb812411c 0x4ae5265a825e84b84d6628affdb043c99f3d998a 0x4e779253aa32f8de44afbf37444c7ff3af214155 0x182779f2ebb6cd934ed21beca943a46f0674444c