ATTACK VECTOR MAPPED: Vulnerability Map 0xaaf45feebc65db3724ed3bf6608153c7b8ec7473: Active Debugging Permissions
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0DC32C051F8B
|
Infrastructure Scan
ADDRESS: 0xaaf45feebc65db3724ed3bf6608153c7b8ec7473
DEPLOYED: 2026-05-11 08:35:11
LAST_TX: 2026-05-11 09:34:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Latency: 95ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xe14e27b28e33939a4f3897953ec4e06b7fd263e5. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd657f30d213074e5e39256f195a9a93994f8711f 0x7ad8196f378d704933b1367dc254e08723666f9f 0x44b444f315401f56fca7b51a7490f49a89a48bcd 0x4b9e614e61c727d549ca482634b251f5c64e92df 0xd892fade754516e877a6fafb2a5cc17c12f5328e 0x36a119e19576625e32e4cac4a2523ae572a35136 0x23efcc7121c3a9c8030c10d4010982b9cdccaa29 0x850a84bd4d866b107aca019cf0ea12c7eb519e79 0x24eecbf79a39cb663f569e36457d8e29118e25bd 0x6a6b5267ed2fce3f2b2af6d9184b064cb8cc22c3 0xfdd5ffbe65f2720538953331447a4669cf8a7160 0x66d6f4e4c180284291d90835e268d4da3f5b830f 0x4ce48c77f705b4f03122039ae0457fc8c2bad4ee 0x3a995556bd8ce19de852cee8b6d88cbcc0961968 0x67bfe749936ef42f0811c4d4e30a387bb91f7499 0x5bda2baf919b6fc92a1b110629b7fec13c39180e 0xead72200018ad3eccfddb5b646e804461ee39e8d 0xab4ee3d3a9e1d2628a0ea7832202e26f42bcc10f 0x0bfeba626cb4186e804338bb7dfaddc3451ec533 0x3eac5d5322c72222b64227fac7173f34184d9be8
