REMOTE TAKEOVER RISK: Security Review 0x325c3eaa282f0065722a748794776d8eee244fd7: Remote Debugging Potential Risk
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49DC15C7B0A9
|
Infrastructure Scan
ADDRESS: 0x325c3eaa282f0065722a748794776d8eee244fd7
DEPLOYED: 2026-05-09 10:31:47
LAST_TX: 2026-05-09 11:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 1041. [FETCH] Hex dump completed. Entropy: 4.79 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 1.63 ETH. [TRACE] Program Counter (PC) synchronized at 1568. [VALID] Consensus reached on node cluster: 5/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb790b49831ebfc1b991ddc02076e9bac81514f70 0xa626a5f33e18db0f804a3fbd6de082e3b2b3877a 0x6df6ad4e5df738068c6ceb45db6e8bcb9aa4825c 0x9c522360a057a5cd71a4ea92055c83243e2d8b60 0x3be73e8b7a065634ab28df1b8f64711692f9e3ca 0xe801c9594d27fb9235c83fd7ef7a4631c5049381 0xaa1c3aa1b6d188ea078f5e6c2cb406c7a3f7b716 0x2fe2644b15ea065a191ffbc0ae3e86c19d60a9bb 0xabf2004823afe42fb2dce6e8e61a90ba21cfce6b 0x2142739fab084a1d5336ff483b881d69c4c9615c 0x0fa030fd1c8867b9a3f3ece5f70e9be73bdd2654 0xbe3fd1447c7b6087b49fd9b9681f3180280ee80a 0xacc617db94df73499d9e5d5d99221333b3190c4a 0xd03da5bddbb1f5bc86fc6332c51cb3256a682f63 0x4c0798d6a09894c54d52550a301e6f0eb2f6e9d9 0x6da00d2a2fc334757475b4d45b29e13f67e3ff1e 0xb8922fbdad22e879e7c7961157bd5cd441dbfd5e 0x1eda7c64527656a2ac526ace890929fdcc5af6df 0xd48e222e91f339bdb41e21fbeba2b7d046566082 0x742eb84aca6d3a6cbd4c9e6cfa7c6a96a1f597e9
Author





