PRIVILEGE ESCALATION ALERT: 0xfa3c75f3f849e9475bb026f70b51be27c90467e2 :: Administrative Vulnerability: Debug Entry Exposed
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4069FD455C50
|
Infrastructure Scan
ADDRESS: 0xfa3c75f3f849e9475bb026f70b51be27c90467e2
DEPLOYED: 2026-05-10 21:09:35
LAST_TX: 2026-05-10 21:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 18ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x7a33913f). [MEM] Tracking pointer 0x2d58a2c8 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9922985676975b803b0b8340ee4f85f82a664348 0xeaeaf253b2d73827115dca040722547ff3daad0d 0x55304fc316429bf9bc6c0c7a55afc53f3306fa71 0x35a6a3b955883756e301d2f1da191c35fcb209fa 0xd4524e4ce8d7280e9f7884de1de4082baaf4121b 0x2b4496d1ed7367c7c6e830bdfbed25f7c8fa0122 0x4954a01f65558b500aa800c9950754c49d2444b5 0x1cff2e2898521335772ac7beb70ac8b2ba503260 0x31f167a3cd1923673eb72434f831bc4ea04ba6b8 0x0e2cac69c03cb4cb483bcd7e394ac157fc22fd72 0xc9cf9087be64a022952ba380d7a93fc522512bea 0x1adfb0de71d454cf34cd0a5e4c1db070778bac36 0xff50fc912312043508f36a3de28d51bf618c919b 0x7abe9ec4217cdd6d8334d0e8cde890e4d0aff9f2 0xb8996a2571df7ac3fae1ea844820bd8010ff73a2 0x83592ef846710aaf13b51fb391fec8bcc7706812 0xb2cc45709168a520844dd96c506c65f29a31483b 0xb98f247a49f0c27c1ac1505f7b659da4528631d0 0xe86694b6f1e96c834af723042670822f3a6cc632 0x28738398c048a19d4e70fb1e5868654fdbe279d8
