VULNERABILITY TRACE: Vulnerability Trace 0x180837a68bbe6afc17511d03970479504faf05bb: Internal Debugging Gate
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-20EC092A7C19
|
Infrastructure Scan
ADDRESS: 0x180837a68bbe6afc17511d03970479504faf05bb
DEPLOYED: 2026-05-01 10:55:11
LAST_TX: 2026-05-05 06:09:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 66 segments of contract data. [SCAN] Analyzing visibility: 3 public, 1 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Balance check: 8.23 ETH. [TRACE] Program Counter (PC) synchronized at 9576. [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb38551378e4144dd6a8e8dc3f7c88fd2e4f58712 0xf9ec14a693217af66a057b9478bce5a0ccd4053b 0x698d80fa31fe4e578a14e2cebad75e6ca144b2cb 0xfd18444f93c5b7c9956f681615b59f0acb4635fc 0x9ce9d7c9e1a3f97dcfb511334421914c78798a8f 0x9e83f7591ceea86f55c415449fbd511ade02924a 0x4eabf1d3e14241d6578608e4b5dc6be783e8b7ba 0x1920a7209aaf726858d5d637387f3160111888c5 0xa5e3616a78c989565dbca530e49774421172b31c 0x2c2b18558784f65c2eb5b840971e21d7799c00a5 0x1003ffc452d2797c555d89317534cdd215aa2560 0x03eb7c21147641938373212aee91ce037f82dbb6 0xa0ac4fc6ed42a5d1aba1a8fe1c5b66168a29b33e 0xdf906bd0acc8053041bc947b2cc1834feb33e87d 0x8b87c4fd61aa24a578ba9ae30d6165d7445215dc 0xefd7dfd35ce93f719127db5cdca38ead42dfcc8a 0xb795d0aec25c33c7fb6fa3e96f8bba9d28b0df6f 0xb1501d99b54d15558dcac5369bc0d094c19be429 0x8f493a96676a9c4050fd7d4be43af53ec205ff23 0xffab2b88cb6a1cf356ad585e68eb0d791ea4f772