02 Mai ACCESS VIOLATION: Audit Summary 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DBE147CD9253
|
Infrastructure Scan
ADDRESS: 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455
DEPLOYED: 2026-05-02 23:37:47
LAST_TX: 2026-05-02 23:52:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 63. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xb2450a65 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Verifying ‘require’ statements integrity. [TRACE] Return data: 0x38eb8aa7… [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd55b268b1b8cf5cfb709df19d4953cec6555a484 0x61827b8195f247038fad4061bbeba6c3186faf8d 0xd75a4c7544271cfe38f6a10e381923627a950c5f 0x1158cf1f9571ad0f3bd1e210b585026a1a236f37 0x2f15fd484ac15f3078a0a9d98efe9e813cee6e9b 0x3a5eedc432b6fb0e5eedf206b63f7d9334989309 0x0d7d3c86fbb6fa61c953a5f971c992f96a7a137c 0xa8ccb12e68423dcf72730ff43c7bd891f5dcdc99 0xeb7391d17ddaf0672e7fce3e076c06e226d80b75 0xaa32816aebeaaed7890da510996589d7251882e0 0xb08b934246c17bdc1fa2a1790ccd5d3f3aae1d1c 0x93e057458f890ddb36077dcb40c7e13cb9c0cf55 0x14fa6a802003b37bb01c9c6b6d6ded1d942aac4f 0x0d50087ec04881ab173d31b90c0f7f69dd83e1c8 0xc6a852ddb435122d25f35363d46771f0eef0f34b 0xaf7ad8108dcc240c4672108f5b8fcf0d388dd84e 0xcd3d317958dfa635e7171b6f9d413fb4c82bc9c8 0xff42f774aa03f2245dd4e91c454117c4ce5e399b 0x11dc7f2ecd36b41f1263e440dc08493a74ceaaa0 0x36f708f6276717e8c6863adb4712d394cab49eb5