EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0xe92df7ee8d415f51a0a0ee5fd1ddf8328b6c071b Contract
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C31EC453BA97
|
Infrastructure Scan
ADDRESS: 0xe92df7ee8d415f51a0a0ee5fd1ddf8328b6c071b
DEPLOYED: 2026-05-12 16:31:47
LAST_TX: 2026-05-12 17:35:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Synchronizing with block height 94166. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.74ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] State change detected in slot 0x61. [TRACE] Bytecode segment 0xe9 analysed. [VALID] Finalizing audit report for 0xe92df7ee8d415f51a0a0ee5fd1ddf8328b6c071b. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaf0f108e6d98ced746077f5bd53099b94844b083 0x88622a24d778bfafa39fa9093c7026f1e8d30136 0x9a0142569d385efc4fb027ab3f13b0056b2922e2 0x73c1978214629f2a13ab497d4436c99768ae195b 0xad0fabb9882943b798fc60bc38b20fc4552378b6 0x4b8e43888b73ef53fe187aad4299a5c3aec92c79 0x14ceb681737d4b6034a82e0b905f393833497b11 0x1610298a6615edf132b9367c86b92f054b8953fa 0x1f89539a9deec1b07be89035bffb33f82006ad0a 0x872ec8d78095a722d76b6d1369192119559e12dd 0xc3069d14e280fed293e4071ef452531a7476bc2a 0x02a24a711bd40d3aac3afc4da120facbc70435c3 0xc75cfa89a7aca209ceac7aa341e3842c9c809cd5 0x301a2aea4646dc3e599d1a22bde13d91add6e187 0x688c667f76bf1788f3ba3e4128791817c9059494 0x79184f255bb5b018601944ba8716649aad2312ab 0xe838b5fd8f4c9dd6ad6e73b3f69fb9dfd234fb1a 0x97f67c58a4549db45d43c21e19342054249807f9 0xc02637d8bdc9cb4e39e904df4209b7bee439d323 0x0af344b5e1b3e69f6e8d610d02abc7850a2065f5
