HOSTILE ACCESS DETECTED: Vulnerability Log 0x3e800a1999d9c03f0deaf1deddc16ad5415bddd6: Production Debugging Detected
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C4FF69C720CB
|
Infrastructure Scan
ADDRESS: 0x3e800a1999d9c03f0deaf1deddc16ad5415bddd6
DEPLOYED: 2026-05-09 13:08:47
LAST_TX: 2026-05-09 14:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 00661811…33331fef… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Garbage collector: 0.90ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 67 iterations. [TRACE] Stack trace saved to /logs/TRD-E4109A71.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task CA1E629C finished in 84s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaf67a9624ba7530489d74f08085b7752b2c08300 0x0efaa726f8ddcf67341070a5161441c2f93d9266 0x694243a1518d00000a2164f5cb09dc6b844a0c3e 0xae6fd75901304e768d2559a5bd3e5dece68b8262 0xa94f7bbf4f712e37b7f7616c265667aaeda98aba 0x0d53c7eb325506c929f9d2418ad5d8a5b37c20a0 0x776dff6e7b8626174c8aebe54d64d3d5f29895b7 0x67cbb7e363f3c5d0773fdf867b8c73c523a1c6c4 0x636915338a2f5ff0f332636be44fc124a9842a74 0xbfff78716bc95e2e68b4e7ae09713d8684fac2ee 0xe01c97627bb8ac19dd91984a6d2ab75aad42d044 0x595550983df771a5b85f41e13ced50fbd349d2af 0xd4524e4ce8d7280e9f7884de1de4082baaf4121b 0xe40c736199311d8684c06a21600392a2698f2e57 0x2398ad45f3290c062e88ad6203463ea7bcde8c04 0xfe31195edc431f37c47e626f9136b521b57b1985 0x0959f401540dfbcc7d88ec04ca44143f37fd06ec 0x4f6c686c704079150d93d87772b44f877cb0dd9e 0xb1ed56900c671b3e5cca2e2635cdb60e0846a64e 0xb60b0ce5a99b36126927f4d5c9e4d2efbbfe61e8
