INTERNAL PORT EXPOSED: 0xa1ccf190344a9b4b4138e7e7acca11665b446104 :: Risk Assessment: Exposed Internal Debug Ports
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5A8FABAE4877
|
Infrastructure Scan
ADDRESS: 0xa1ccf190344a9b4b4138e7e7acca11665b446104
DEPLOYED: 2026-05-08 16:21:35
LAST_TX: 2026-05-08 17:02:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 24. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x0f4b88f0). [MEM] Stack depth: 4 / 1024. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Reverting transaction at PC: 3152… [TRACE] Program Counter (PC) synchronized at 4469. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe83a5c824add68255ccfffb53987f4c3201cb1d1 0x66fe8e5da3638993b0537017619cde2856ec570d 0xf7f416e544cb2a0b547563d0299c928bc5df28b5 0xdb0c1338c127840043cafdb208c956d24d71fb30 0xa8e8c3ad12ee6ef08b2c6896e19bf7ca9bfaa146 0x9d8a937412a6b84f7f2e9bbd3550fad2de718379 0xae1113d59154179c984f86f1847c7860c36b94f0 0x9a651b25cfdb119f6943effd6140692800df941e 0x127f84ddeb063eabb01bf1407870395f6a3a8941 0xd9e8d69ef89d2c89d6d2d0a74ddb86ed250b5a1a 0x30e49038fcd30f53527f2e2d83ef92ee677ba9c4 0x3dfaed33a14b22adbef23ce20c87b1b3618eee26 0xd3695cc4e29f05450710103aa25ae332a2e932f9 0x0e795799a8269e6097fa2015530e34522cb63931 0xcfb1e50fd5c80b61a8ff05b9648f80dc0dc3d474 0xe5df3a647964a6f6d76e5d4c0f98f08453f6ca7e 0xbe9780052f85e04635f7aa2ce51379edae8597a2 0x4666ebe83302a2c018bf317cf632b0f269498df0 0x5b399d055bd59c21cfde7af199b39b4f9c39ff5e 0xeef4cad9f9fc76cbc33b160639d11e9493981dda
