ATTACK VECTOR MAPPED: Vulnerability Map 0x1f6102a413d72a6d37479405adf14e8d7910032a: Active Debugging Permissions
- Home
- Non classé
- ATTACK VECTOR MAPPED: Vulnerability Map 0x1f6102a413d72a6d37479405adf14e8d7910032a: Active Debugging Permissions
- 8 May 2026
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FB082CEF057F
|
Infrastructure Scan
ADDRESS: 0x1f6102a413d72a6d37479405adf14e8d7910032a
DEPLOYED: 2026-05-08 07:18:11
LAST_TX: 2026-05-08 16:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Stack depth: 5 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 26. [SIM] Reverting transaction at PC: 5220… [TRACE] Bytecode segment 0x49 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x26af7bc1ce70203d6b6573c1a3fe74c97b2da550 0x84d5a85305988b365eb8e9107603f237aa434b22 0xe3b512520539f7b85e471fc2bb7ebbec506c202f 0xe5d2b824288c7584670065c50007a1e4786ad4b1 0x78ffbae0893aba4edeef8c3873d5411ce2740ba1 0x670fece35374772a0648a46f51a9ece07ff6ecf4 0xd8c8f29ab510c25d118d387266a2d349ea8fca73 0x6dfdd236384708bd5b6df5c46ee87303d2629bff 0x58a0d2006b8713f4d567789535a53fbd033a6c10 0xead9e1827ae44a631558c31a6fc29f415ac0bd30 0x6c259ae79a972ef5a6ee87897494086e573ec4a0 0x1a1d58f10168fca78413ef5f94592cbda59bb4f9 0x3edf9c76d196e36526c22c5b06c950b9a122128e 0x37f5ddd9512935793141680a48da17b6c38db17a 0x1ddef7fbc04d377dba7d43518eaf6cc6f50b4bf5 0xd200b31b62df713bd9bde67531470e20ff7a4a52 0x6a3b88379f8d3961fccbbfa691ea0574a63fcefe 0x9c8d094f1eb97a961147d10fb3081f8a53ef888c 0xe4804be524a0df09686fad72fe7a9e462854bdd2 0xa1448dc2d02092426534e28ae18dbc9c84e67f8c