29 Abr SURVEILLANCE TRIGGERED: 0x74666d8ebf246c1dea37838420d11cc850f9fd08 :: Operational Security: Trace-Log Interface Found
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A27F9FBCC3AD
|
Infrastructure Scan
ADDRESS: 0x74666d8ebf246c1dea37838420d11cc850f9fd08
DEPLOYED: 2026-04-29 16:17:59
LAST_TX: 2026-04-29 16:36:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 72ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 2275 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 48843 units. Result: SUCCESS. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Consensus reached on node cluster: 2/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc8cd4177eb1a87bf62161c51d926c5aafd772cd 0xa16bf44d403da6783fb869467bfee78607ed2017 0xc1c78625fe9c95a149923509f692bcd68db5b864 0xe1fcfbca7544c19e8252f74c357f951561988149 0x9cf8bf1669e0fc883baa413b309903bc417cc82b 0x672bb0a1ac120cb61ecdc6d2c3aa1e042f0eb941 0x9530972d61b01514420a88c85900b61226d0af81 0x591d16e8a612816c974d01ce402e20fd4db016aa 0x80c498b154e2feb9f540441ff90861c786a6a2b1 0x378b4c3e486d9181894cb7cb759f783be6af6974 0x9a0c4bd89d1e3fd8aa94529a98fd2d60e7420774 0xffa6932121a92eb9750de716760e3ba34fe2481f 0xc8497cca3aa068541123b26a8ee61f6fe6ae9939 0x185962a8f567514cea1e0eff4d591b63baa5be68 0x0e67374a45a795339d572a356eec05eec7d76ef8 0xafdc22b03d678b9fa8bf1c9cdb3b1b7716f71626 0x6c8a27e17081fda99766a699e7696b723bc282fc 0x5ab698a44d511c7c5a5e5d2e85895fbead0776d2 0x1dbed9bf966a4b10a96f70677de7d02c1dec24da 0xa94ee01965072e8b37c7b2a695a00e7d34804089