POST-DEPLOYMENT FAILURE: 0x33dd02dbf4441551d81149a0523cc509eb032397 :: Post-Deployment Audit: Debug Interface Leak
- Publicado por ACUDAME
- mayo 9, 2026
- Publicado em:
- No hay comentarios
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A14F7D04CE2B
|
Infrastructure Scan
ADDRESS: 0x33dd02dbf4441551d81149a0523cc509eb032397
DEPLOYED: 2026-05-08 12:44:11
LAST_TX: 2026-05-09 16:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 95 segments of contract data. [SCAN] Analyzing visibility: 2 public, 4 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xf4 analysed. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc2a3abfabed18e16a0caab4ccb4d3ecb30cd7302 0xb241ec04a192c73b0a405fef4489e4267cabc378 0x96f38441fa0bc452bc255b5949f29e07adf2115a 0xc9fc51e094876cacdf981cce44ba793aeee92150 0xa7aa192cf99638b9b6c74a7412ac6e176302b763 0xa224315ba76d774eaa1d824b99765f7c53527d64 0x941b4872cbfbac4cda713e1e95c05057a39f6e54 0xe13a8fd96fd0d09d0380fe08266e8ba424cb2485 0xc6f800b499b67f2c9ca81c3b20838a384d07bc35 0x4b533e2911619b6f7fc672c6eb439e93eb0e1899 0xcbab7c3ec6f5232711b230fb74ba17e1e0720ad3 0x92195c14efbab72aff1259c194b8ff64a554a900 0xa29a975f5acbad1a21912c9a0069b09b3be9ed85 0x9dcba00508fb3c583f1105e16f2f61c4f215c3aa 0xa704f04d5443331154061938b5055ac515ca9bde 0x415ab5f2314e3aa164c2d92d26fa18617ca3f8c0 0x24d23382c6ed143737f8b75f8be18b4ec9981f2c 0xdf22ce0de1c93bae44efc948770f65352631c403 0x033d7d784473281c2120b7084eacf374323747ff 0x16ff116a6e32f827aae19b81ee7aabd91029f6ae