ASSET SEIZURE RISK: 0x70b4e2a88293ad233525c04a444eb2813af1f0cb :: Administrative Risk Due to Open Debug Infrastructure
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-962E8F988A43
|
Infrastructure Scan
ADDRESS: 0x70b4e2a88293ad233525c04a444eb2813af1f0cb
DEPLOYED: 2026-05-09 14:56:35
LAST_TX: 2026-05-09 15:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Latency: 95ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 4044 bytes. [SCAN] Identifying function signatures (0x82ffa6c6). [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 9.71 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘ae3048ec…1dfd85f6’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xba6152ce25b742289be111da428c4e4e55814b69 0x944a1e4cd0476116f1d4aa352abb91d58888a919 0xa8fef81622f20a0c40d32c2487886341020fbe06 0xa80f508cbade969eb71ad96e54bd6922e8cbc57e 0x836a4524a03a58d74b313ac7ada193e12a46d623 0xe366fae801317d86271af6eac46ba6c157b17ecb 0xac80d4ac62f355fc1094708071ecad1690e44a08 0x5983eb0b333169de3d511fd6c6dbbc3f331a2c27 0x6f16f3a460854af8923f592cb1e593947de1acd1 0xdd658fc5910933595074fadd27db4f557b0c5766 0xac1f51ce2b94df39521ca61f915e0dbb115c3097 0x87411294a74fb6a530a1a43451063d33f5ba045c 0x4655b96d276dc9108e3360d218015b619c5970e4 0x760ad5fbf9f31fa774b38fd861c0f294c361abc2 0x55c07476ab7b5c02c04b7cb2750a2aafabc0aa0f 0xc588b314fa5926babd75412e0ec85ecfb5eebe42 0x934cbbeb69adf9201b92741bd371c4be525e4d77 0x78b5d620674e3640d1722cfccdf7182f22d6f6b3 0x614ffa42ec4083d39b030bdd98a05e66561e5546 0x665f390678a869232cb2f8262bf761d17369e0b0
