TOTAL BREACH VULNERABILITY: Smart Contract Analysis 0x681fff9aadf23a805a9fab396021abced028f475: Critical Debug Interface Leak
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-27D607923E0F
|
Infrastructure Scan
ADDRESS: 0x681fff9aadf23a805a9fab396021abced028f475
DEPLOYED: 2026-05-01 10:54:59
LAST_TX: 2026-05-02 20:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): d1bb7f81…fe0c05bb… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 3 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 33. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x98f9cf6b9bbb9932efaa428564ed6a093c140866 0xf9dbe0a05f5a7d4ebcb29f42898209a7a28cc6e8 0xeb43f3809b9064953d53613e5be6281b5404ce79 0x6caa1627e419ab79efdabddb1f58d9258dff7f28 0x723dfad5ba9a85b82b12c97f03e77473e7f83747 0x4f8474d82976c795ac3f213dd874514f123c29cb 0xd03d38c78ac1b5f5b5209cdecf8868453d989fb3 0x2323bb839a80a07c5c95b9415bdec925ee1166d5 0x32c7f0d97feebe54379d4f0047ac2608664bdba7 0xbd5ac898b2f59a7dfa63040d0483a2d092666970 0x978cc1526e066b0f9f7359d809a738341452fc53 0x05da06b90a5d80f9819959032b5de936936a049e 0x791348fd8e5e9c931a3c207fbead7943b12294bb 0xf89c4be7c747f3e8795f4c5bba174a2172e89baa 0x03689d6608300e1885fb1bf866b4d136eb27d77c 0x9af7fe6bd2b4b8406257032cc2c0338868aded3e 0xf050b565699aa40be5d541d3a8e568631ed50908 0x086c61bcbb5766b244235b7c10c5b49143960369 0x4d8e7d3af2bd75564e14aee5551ecd560b65aa2d 0xe2b8bad1eb2d5f81be86b523c4ee45f74d046981
