EXTERNAL BREACH WARNING: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e :: External Access Warning: Debugging Port Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E45E2187856B
|
Infrastructure Scan
ADDRESS: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e
DEPLOYED: 2026-05-10 02:23:35
LAST_TX: 2026-05-12 06:07:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Handshake with node 0xd4d05843 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 4 public, 2 private methods. [MEM] Tracking pointer 0xe0e9025c in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0x9fd2c52c710b0ed94626d1a5fd4abd6ed9ce1943. [TRACE] Stack trace saved to /logs/TRD-BA3593B0.log. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 66cb0c40…1e1dae1f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa5da367fc966482cf7df32eb377bd5a312411d8c 0x1f99baecae6a47712c985467a738a77843b5a4bf 0x10f579f4dc6a3959eeb8d5acca8f3c188d48aeb6 0x133451b0b2e35bc683fe792781dce41a175b6508 0xfeff27e2b255e8656e083bcda6bfae5984913dfd 0xdfc990333c50a325051e00dc3cd5e7b43dcf08db 0xacb75f45c713be6cda87edd75d335dbe7748e5db 0xe248ca35a5a1c815010348e2ed8d40583e6365d2 0x60b6c141b70178419a10a59a9507ec238fc9e597 0x143d81f800166e87c33bea7e8170b08fd4a8035f 0xd29622dca78b1f44f0a321dbc7440c206eb7e6fb 0xfbf8bba149d421ede23f4f2e8579a18f46bedeee 0x4da01345a4d24817f91ccd0422bca99ccaec6735 0x4b09010bcf48b51d6a4fa5f33db800317cabe093 0xc789031c7972ac609d2e9392f61b9bd203b7840a 0xe8f2c2ec12b244958ebe7df946f216c742f6e3f9 0xb4019a5cc132342d08bc76c72d37d2025ecd9ec0 0x3dfed506193f9df029ff4db93dc2e0a8139d4d14 0x440241785c15c4f75041f7ad2da671ccba62e8b1 0xc5ee69c37aa4f5d16b9a070af495be9571b25e53