REMOTE TAKEOVER RISK: Security Review 0x65c7f332516a80c044fc7f27362a49deb0ad1b23: Remote Debugging Potential Risk
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B8F07B2B5A4B
|
Infrastructure Scan
ADDRESS: 0x65c7f332516a80c044fc7f27362a49deb0ad1b23
DEPLOYED: 2026-05-02 10:41:11
LAST_TX: 2026-05-02 10:57:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x65c7f332516a80c044fc7f27362a49deb0ad1b23… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.36ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Gas used: 27540 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0x370693dbdc91b456699eb7e21770a3e8de995bb3’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x97b93539d2a3bf9d75429812a15e9c806a2bab67 0x636f7c2a3fd71336ab38258467b2b7c95e6d6c55 0x5fc6df00f446cc23f555c45045003b253a19ca30 0x64a896a2c5132752f69a12e227c99f334b10dc34 0x7e7568351a49cd35bfc1e38424174d74c179dbf1 0x0af0f58d7668ad710c0ce3aa63fc91eb51e2a2eb 0x6e664ddfd3dbdc980bcda3eef0bbc0faf8cbc498 0x133efcbde6b513e2e4f7adb87c4e27b651e4f42a 0xc8f2552687f5f329ee450885c2ec83165a48f01b 0xec89864ca91f5412b8c1f723fe8e5b024932b1b0 0x71c3b719c4edb546a6bb759c9a9e81e4e61dde4a 0x1f744628a41f401042d0227268c8276c6a7fed37 0xc3805618f585d85e1d570537ca7c5b9abb6b6fa8 0xa06fe31c7ec2ce64b43b8a757b12ee66df0d6374 0x5f7835745f15e7b8b88735efce7289ed17718f41 0xe2cccc71d69af33e9bd180e607f12b4084a0c242 0x1a7e3078a2fc12fb9bcc7af8728a490b10e0d25d 0xb27bb8c5d7f607643ed80ebe0ae589b3ee70c497 0x30a936c654ecf282b9eec2c42b0933135a170778 0x65f866285b99eb68fed9bf28b4333387b2e62daf