INTRUSION PATHWAY FOUND: Security Scan 0xdc4be7aeb107b911b2ceb896a5dbb3c37cea540e: Potential Exploit via Debug Mode Interface
- Publicado por ACUDAME
- mayo 13, 2026
- Publicado em:
- No hay comentarios
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF61507BECA4
|
Infrastructure Scan
ADDRESS: 0xdc4be7aeb107b911b2ceb896a5dbb3c37cea540e
DEPLOYED: 2026-05-13 09:44:59
LAST_TX: 2026-05-13 12:18:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x2f14. [SCAN] Mapping ownership-protected functions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Gas used: 11709 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6e0387775d822185172e920f574e78c86a9d7148 0x52c1696503e0524ecb58df2949bc76a002e7d59d 0x958bcd25e6d67f17546b190d44af9eb3654ff50e 0xf8d116750876ea55405f017ce456e5ced4ab4219 0x1580edc5a0f0f9c8e6c09d5fb8e0d19d04fcefcc 0x9d78a3f08673cf18ab782c461665647715b373a0 0x925bde9cbcdc12358cc641a53aead297ddeeadbb 0x17181059feb1e564c78c0b01f0899f202010e87a 0xf693248f96fe03422fea95ac0afbbbc4a8fdd172 0xc62e8f579fb0153f05df50f1e233f19676b3ad7f 0x2c7bffaf65627c8af0a1bb957754bd90424e47ee 0xc368b814c87982a751d6d1eafff9181520382544 0x03f65ca3e00a73a98abf10b520aeb8232fb28e66 0x136716ae515f4dbad4a425d3d316a65db6e59ce6 0x8b7ee142c7143940be11b26a283d30e8b56888a3 0x712c565f9b36cf46bcc2db344bcd5972e19d94f5 0xc0dd53395052d1b6a679e95d2548e00eb2bec998 0xa69f4e382047139b7cac62909903d37764c3b7ee 0x434a85a48ec738472025a1ecfbfbc6d5adc9ddc1 0x350ef52d763a0e8e63404577e63a70e70f853ecd