EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x80339d73e4bacea992807f657a9fb7b7664d8284 Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E9F225AC647E
|
Infrastructure Scan
ADDRESS: 0x80339d73e4bacea992807f657a9fb7b7664d8284
DEPLOYED: 2026-05-01 14:32:11
LAST_TX: 2026-05-06 16:51:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 50. [SIM] State change detected in slot 0x35. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x2a8dafba125f2fa50195cc194d1dc41a9bcaeec2acaf9132ca551a76847df261. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6c6828705faa43fe1d7078b36555f1b575c065e 0xfa11e3b6f477856e6c8ad050ed32d77ccfe47789 0x7743e77d31ab441a728b2a381cbc93ef789d436e 0x0007a65ff9e1ee766875c0ea71b9eaa6b42b3e8c 0xca14e41a42422f9f9733109ef428ca6d41424da7 0x02df47c64e1f62b6a9da1d81524740596669eb7a 0x50ae1e4a612a4623b747aeefb30afba82804e12c 0xbb000247716d1c8148de6e02ef5f8270143a1ebe 0x929742b635466d2a0ece8c9c28d6ccc938decdd1 0x7e734460c49a3788d566df00ec7014603a0b9a5e 0xc638fa491299b29144f633b8e5cc91b5ecd9bf45 0x841a3148d52f8db36f890db4cb4f67b6f93ff132 0xa8766d86ad02c923887a2c2de894aed986def06e 0x2ed310f5c2c521b32c0f84d43fe4115669644b72 0x1e884f83e0801ff559a7971d480b8069d570e68d 0xa5342507aabb7557610d4618a10f4dcd04bb59e1 0xdbb4199ff539d1672ef79629e94074e34b2f2eef 0x73ca70dbff82fcd269eb37b1f437dfd7f5cd433e 0x0c2582167fb2c636eba3b63fff1c4b186e643956 0x63aeab4f61740d1663dd47b2eefd07977ca5791a
