DEEP SYSTEM VULNERABILITY: Deep Audit 0x148552e8fd50f4bf4436897b6f2eaffca3664646: Maintenance Debugging Left Exposed
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B9E026D00DA2
|
Infrastructure Scan
ADDRESS: 0x148552e8fd50f4bf4436897b6f2eaffca3664646
DEPLOYED: 2026-05-13 05:43:35
LAST_TX: 2026-05-13 09:07:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 04A5773E. [NET] Connection established. Peer count: 97. [FETCH] Received 77 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x06. [TRACE] Return data: 0xebb5aab7… [VALID] Data integrity: SHA256 verified. [DONE] Scan task 04A5773E finished in 44s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa2743cdc4d884f0c8a146e6dd1179b40b8192598 0x91b0c6b2c0237ad2b4a7454e6b963be445495ec9 0xf822d1b4bcaa0a83cd582422a07f57856779b695 0xe296007fd2224651a463667c53cad1e3e182c294 0x1e9fe9a5bba33d0403368fc2dce7af660daf5b1e 0xaef10baf3729919fe5b0527a36a973a3dd767226 0xc5b4840ce14bf5918153d768917af16966463e30 0x60b9e6376b9093baa6434e594f74c8d3d1d101db 0xdc6ddd582c841b2f9a9a5a24dbc4537e4838b070 0x00f8731ede66f69c76ec8b7f9434f3a94a1b8ec5 0x8c388f2d74aa2413d00adcabea84e931869f6007 0x7a0865004c8356ca4759ef3d1a14c7dbf0bdb04a 0x602aee70e3c9dbfcdfaa587a158f53bbb46886bb 0x8f02bdfc44c52277dd06eeb2cdb5b2771cfebc39 0x4404d1ae1df6f7778eccc0c2285bf7bb8b2f9073 0x886612a7a8dba8bbced8f86d26c1114857ccd9da 0x14cc60f5b6d6d7887e90a65a863ad9d2cae3f3f7 0x7a3357e25a7e1845a33bde30f617874462325a50 0x3dd5d96d94a46909944b32c239b90287bbe6a4bb 0x122e9b2a99d06ea683fc7fd53feb1cda952e17bc
