PROTOCOL VIOLATION: 0x1b0977e7882760282733226543b54c015d3e08d6 :: Unauthorized Access Risk via Debug Protocol
作者敢, 当王
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-54E583062138
|
Infrastructure Scan
ADDRESS: 0x1b0977e7882760282733226543b54c015d3e08d6
DEPLOYED: 2026-05-13 04:29:35
LAST_TX: 2026-05-13 05:31:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xf5c0. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-1D1CCA00.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x55c3665d900160339062d94848cf486d000bbb28 0xd8617303567dd3c1194aebf7ca80621ce3b282e9 0x85d0ec3725c000367039c5e2229d37bcd64e8c72 0xbd7dd77575992d32b0f1fe557be3fc9d07ea0866 0xc434f3fe3cc3f1bf06c81a24948472e3924a9616 0x8c056ad3f7f7f1a601e6b2972c6eb7e211b863bd 0xae86a02dd6b8ed953e37eda690bb541dba17b275 0x155b8ecceace7354bb00648b2ed9114ddff813a9 0x648351df409c0b6f92c063481b5d1dd09d318df6 0x1837f7476e60f30e95545723f686e751f366d521 0x64d3f6d41d24a6bf39857e43fec8eceaefaefaf4 0x63093ce2040a3b8e18d1aeab6f37edb1291cba17 0xb26d1ae2309fba25fa6a3b92e40391f4f15423b7 0xc06eafeb238dcf46afd2706409c6abe2298c5319 0x544efe584bc6be9ff5694098fbf8b5125e74de61 0xbb997f41d5eb0471ade2964a6f43a939b5c8645e 0x707b5fe0944eba8b60b7b7947485fc3580815582 0x03571992cb525c00041de3c5c815258730acda06 0x758a0c24651df56f6444cffe36429fc576e90638 0x450df9cb1b7dd572fd1b79d1933c0ce15508d0c5
