REMOTE TAKEOVER RISK: Security Review 0xaa32816aebeaaed7890da510996589d7251882e0: Remote Debugging Potential Risk
0:00
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41A71CBB0EB5
|
Infrastructure Scan
ADDRESS: 0xaa32816aebeaaed7890da510996589d7251882e0
DEPLOYED: 2026-04-28 05:35:59
LAST_TX: 2026-04-28 05:58:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Testing edge case: Zero-address transfer… [TRACE] Program Counter (PC) synchronized at 2626. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xac1ca3be2984472a802a862cd9fae84be4315874 0x57f950a3231fa6c3f04868a27156de95ad23fc4a 0xd533d5803b5342882979f135902bb22986bd8c3a 0xf49d4af5619e462f8a1fd68c176a7a8ead638730 0x1643fa3c4761f027eff0c78547de1c436b32430c 0x72270300206d0bc94f894471dc044fb8d99b8e99 0x8c7568fcdd7eb58722c553b93f4db9eda243a3a2 0x92f03a2ae8ce28db1fe6288e641baec6fac69e8c 0x24228a823889c658805cda9ac0e2ac3265f37c20 0xfb86702838646880d01e6f9f3627ccd2ddc9af50 0xc328a8485cf2fa1bbf38b4cfaf537304a9bc6841 0x7832eb6c3032970bffdeea0dbde6a98842d9d27d 0x1f10e9eb452fc36fae4352836d8b36fe3739be8b 0xc7dd7aca44d1b8eef5e634db6a04f8665e04b99e 0x31fd520878f4bd9c7ba753a5c7d090ceec99ad01 0x184087132e945780673b43684fe0b72e327c3040 0xe68cfa67ee534b32e1319a067dfaf344cbf3b5fd 0x46fc715ee0b8349dbe07d04881b97a73fab1e157 0x741ac8a364159ccc35cd965a9ee1574d67bccb7d 0xee145ac0dbce8178cbbfa47b2b75aa9646647c2b
Post Views: 4