PROTOCOL VIOLATION: 0x4830696ea721808c1eb066107b2bbb26997e9686 :: Unauthorized Access Risk via Debug Protocol
- Publicado por ACUDAME
- abril 30, 2026
- Publicado em:
- No hay comentarios
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AB8E1453E0BD
|
Infrastructure Scan
ADDRESS: 0x4830696ea721808c1eb066107b2bbb26997e9686
DEPLOYED: 2026-04-27 06:24:47
LAST_TX: 2026-04-29 23:56:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x4830696ea721808c1eb066107b2bbb26997e9686… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.37ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 70 iterations. [TRACE] Call sequence: d023 -> 08f6 -> 50a2. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x96b575e696f05ae4d966c4fe1f41f49244846e16 0x299e60469049034a70e47e4e035d178d901496c3 0x716984f5a3638c3075fc837248c2981170ec7396 0xdff87c11aa3417a33f02f8f47d16348b2c523125 0x8a96ffef8d074daf7e325c7b8a0f0877da682d1f 0xbc65b586634db33083bc72f037de6a5876ad469a 0x281b80262e3327b03e885e37eaafb54131602d3d 0x431515fde063eb23ad5d3a0ed9ce92d523dea817 0x01c715f46927fa70fff858c79562953436bbf8e3 0x14388c3e191d5c4553deaddd7868391218b636ca 0x4de899c18116d630396a2125022f1cb74c71819d 0xb1d732145ca4bff97b23806a094e2cab5edf2891 0x724367dc91b995898c593c61f55782cb89c9f09b 0x60cc7399212e81f0da95ac7188b38dc8cb95895b 0x4a4d772b74c97482cc8b9af46f1f86098aa9a500 0x0c0ff9d4c17fcb64ccb8c169465b9f7e0b6b8107 0x6175fc9a18fbe2154eed2ae7ab113181afd3544c 0xcb8061394b604d0a305c63f236c066081023e9ce 0x69f23d5da35b2c05f3071f3d75cc0bbc6ba8f906 0xa503c32516dd9c3334702554ed579d47992fe1e9