EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x51bf11fb3772b2d9dabb3dec9f9011e3b9ef4aee Contract
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-55FFA54A1095
|
Infrastructure Scan
ADDRESS: 0x51bf11fb3772b2d9dabb3dec9f9011e3b9ef4aee
DEPLOYED: 2026-05-09 17:12:11
LAST_TX: 2026-05-09 19:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): 85d33e91…eaa3a3b3… [SCAN] Analyzing visibility: 5 public, 3 private methods. [MEM] Stack depth: 3 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 5ceafe1500023902. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7c4ac6291dc63b62ed9015c3bda46850370961ed 0x13b84cd58182e5e571c4dd020bc70194b27a783e 0x55524a1e7873206a706577a4a29ac8d0a89ff49f 0x20f1d5c467faba88ed3820be5baf998349d723da 0xd5364cf63ec1843665b65a5ec4ad3329c59f1c3f 0xaae13ce50724b8efef9658e980d1319501cf550b 0x39bffd3041471ad9498624a22ff3b574882c51e9 0x6487d64ee92ac29c912b850698bdbe315335f210 0x655bdec2b67448f4f47a70834906377dbd2fdc26 0xa730a436ead33e5cf0c4efed707a15e79f528260 0xd852598e8c14a96b8725973093f898421244f359 0x71b3eb452e46193fb7248799156b4e5ea1a2cfda 0x24087268a51ae17e6c68728c645e054a73480a44 0xdc9c71d2bf4f616d86d2a3909073fdb02147da47 0x1faaf3c7171367eac59b7b042938207d35b736d9 0x639cbab768385bb430d536b110a73b0fe8eeabca 0x6ac55ff6d3926f665ae6043f28ffb929d31f5dbb 0x3ab7a6ac496a101ffdb7d96e6b9cf21dd429f94b 0xdcda7747f0267d7dddcdafe7d814ee0180e2888d 0x2f0464985b2034afbe2fbf227cb546961aefee99
Author





