12 Mai SECURITY LAYER VOID: Smart Analytics 0x0654750a6012bd42e06a0f1141153dc8c60f7fb1: Debug-Layer Security Breach
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D595B71B41B
|
Infrastructure Scan
ADDRESS: 0x0654750a6012bd42e06a0f1141153dc8c60f7fb1
DEPLOYED: 2026-05-12 06:43:59
LAST_TX: 2026-05-12 08:04:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0xb8fa. [VULN] Checking ‚Integer Overflow‘ in arithmetic ops. [SIM] Verifying ‚require‘ statements integrity. [TRACE] Execution path: 50% coverage. [VALID] Gas optimization score: 88/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x944a1e4cd0476116f1d4aa352abb91d58888a919 0x719f67341c4fc282833f7c73115f1db366271a73 0x3990a0f5e5682120bf2bc0a8ff860fa6d331dadf 0x4268c5af4d39ef3ed7abac0dd0ada2718e4a550c 0x405f196af17c757c74195b5b14270f46572e7912 0x9a4944a7001fecde1303c88e36ae787a090fcdf1 0x20837e0944a9911bd6bc9ebf9621d4beb9459cb5 0xb7c4d88716da309f1b6f0790a5c37503cbb3784e 0x121df1c83ba51802cd1d7db5df0e76cd4b9dce8c 0x4364638abe24d5e3b0f5170bd7adaf28f920e3f7 0xdd658fc5910933595074fadd27db4f557b0c5766 0x28ff319003d936da110aa7bb167fdbee3e9f455f 0xbe1f754c4308b0e8f5025a4de8347eb233e07677 0x61b0dad9628d3e644eb560a5c9b0f960430e3a75 0x1714e782eb2e646a484f3d2bf7ab400c7d0a0166 0x5de671f7c7d904799830a48342d26d1f57725e1d 0x69032086dd08ab037703d0c9c8cfcf66a3ca1caa 0x68d7b3f5008f77c1097420a0a27e749b59cc7b21 0x98de4ef181cc7a81fd827ff6d44f1548c982988e 0xaf7c84957c5309e176de3f48386b80e55cf65c53
