01 Mai REMOTE TAKEOVER RISK: Security Review 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a: Remote Debugging Potential Risk
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5416C91C9284
|
Infrastructure Scan
ADDRESS: 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a
DEPLOYED: 2026-05-01 04:57:23
LAST_TX: 2026-05-01 08:46:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 48ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Reverting transaction at PC: 7685… [TRACE] Program Counter (PC) synchronized at 4515. [VALID] Gas optimization score: 20/100. $line = str_replace(‚0x961983a96d66b787ce98031e72c3e6f25b042359‘, ‚0x‘ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3f01eb516992b5d16122dbce489d5e009966a98c 0xc59e2d560c84a5e4785741a0102eeb669c26c2e1 0x4f8474d82976c795ac3f213dd874514f123c29cb 0x15bc745251e34e81bc6249ec64e9976218e7c941 0x39df48ee46bc1239a8ce6171e5cfb63f0aac47fd 0x5ef9a920a79d8d2836c6207414c4e9702eaf660b 0xffbd5a76b37e79e362bb045560dfb6298be9dbfc 0x6949f6e188630ed92c49412d4dbd8637d1433fa3 0x00fd1b6f10f95c1b0011583a1f3c2f478e67997f 0x738a4886b3e05d78f79769b5e5e50990764f2a1d 0x46c1d4c27b6a0bb4c2d261413d4dc480e0e2ee11 0xf7498e0dfa1978f1568825a69ab2f23bac51a408 0xe6bc25475619c0fe587fd38bf94180d7d4278c35 0xfa9632bbc110d63c9faf9b4a0dbe9997d933eda5 0x613e862262a55b674f5b438ccfda6c36e7fa2304 0xa91c4490cc98ceffadcfcacbf7175aad432c813e 0x376d0368863e76059a789406a0fbeb3ac3c1417a 0x62b709ebf4a4e3e7800d1bf46a85d7c12f21c3fe 0x03750318522a8685d7d3bb0aff0c68fc9d006456 0x272e6e8c67f11068520a2344c1356cbd3b783d8e
