EXTERNAL BREACH WARNING: 0x9bece23b016bd9a3536b10ba552d7c4489fd5ea6 :: External Access Warning: Debugging Port Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-98889168CAA5
|
Infrastructure Scan
ADDRESS: 0x9bece23b016bd9a3536b10ba552d7c4489fd5ea6
DEPLOYED: 2026-04-23 06:24:23
LAST_TX: 2026-04-29 09:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘922ab61ce06db82bee3e6fac931503787432f6b78f214482d9bcf024ce7a1279’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1bbe33eb4e54a4de0ac03c34ddeeb62c8548366d 0x1fd39f8cb1b351fa70ba9278654f8b333fed58d5 0xc25f15b98952e900565672b4ef9c5eae4d79fdb4 0xdbdd0964a929fd8e2cc7198919fe8edc0166ea52 0x8a6449f98cd50c18852e5ac4e3137924c8306e95 0x2c5b908d36d0b0b036401ff62e07a20dae3ad92a 0xb31378f8a9675d73c8a3045842adcf2d6eb79ec5 0x7fc250f0afc02fcbfeaefff1241c24e352a16073 0x22e82a10d490726bc5132318873220b7ca77da0e 0xb5f661edf3916185d90c4e1efecf3628777c4c49 0x20d5c0d19bbf34ea72af2c384df3b33620de227a 0x0902a42bc7f0b78e3dd542ec05b984ad07b8d829 0x065e243d72fc5e8f8644013f546a0f5c0a080654 0xd20bb146de604f662a032c6a3521e889738f9f26 0x0c4f1b035f6be860fa1889d5bc3951f1f6704782 0x2225ab651ff7c83459fa22a6545ea166dda9f9a0 0x42bbfaa235870fee76ee44ac12327eef31f6eb70 0xcc54de39c45000b01074e4970ca0af9d3eb2ba01 0x580d0b5f1b88a7e06317ee60ec45e2103459fbe0 0x4663a3bb44c844142267bf1ac85f888cc0a99906






