REMOTE TAKEOVER RISK: Security Review 0xf827725498e6fcf62d331566965f5254bcda081f: Remote Debugging Potential Risk
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-58381D875B77
|
Infrastructure Scan
ADDRESS: 0xf827725498e6fcf62d331566965f5254bcda081f
DEPLOYED: 2026-05-01 01:16:11
LAST_TX: 2026-05-01 18:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xf827725498e6fcf62d331566965f5254bcda081f… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 4 public, 5 private methods. [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 36. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x50b7b13ab10958c039d6efe25d394555d285871b 0xaa767040a6944114cc270322049abcc630bbc608 0x8ba999bc053f308b56c0d5154089457b3972b971 0x25382fcb5fbc6473ba32608395812c0bcb75a1e8 0xf47b1d6b8d2d67bc8cf3318ac5d835e242cc6c17 0xe545fb610326c3398f3877751d1abd3a06f60664 0x06636b998000932ec4d96ea43a9d234b5b31a4dd 0x8c5ea5c78b5e985d986f5b3f9efb14be7cfa0579 0xf9616b1c50fd1e047f49aca71b4b43ff069eb864 0xe851dea9e36f992590f2e33281665e159a455b66 0xeb27b2ac9e68132bd0a4b67d63068a7064eb2336 0x15c4d6e0a95507f3a98c0079f866cd3ea679499f 0x7912db8a9e2b95fb882314fc712ae2281f719619 0xf7fef172d44df28e430bac013b8780762a0834e8 0x6dc9816b116a63c2b89108d960378965ae4e5706 0x29ab51cf3e00f63e1487c97585d6e28d7c64ca89 0x1b9bf98e4c24e406d2c5b642a87058fe8970b8e9 0x179a725b2fa331372f32a3c9091f9a0cc1441a8e 0x092267a86cc4d0fbef351dab5283532ffd8a45ac 0xf232ec04534efcec1b0ae249183fb05e6efa9a36
