ATTACK VECTOR MAPPED: Vulnerability Map 0xbd6f652f9149911452452a48a91fcc69bb0665ca: Active Debugging Permissions
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F4E34F996782
|
Infrastructure Scan
ADDRESS: 0xbd6f652f9149911452452a48a91fcc69bb0665ca
DEPLOYED: 2026-04-26 03:21:11
LAST_TX: 2026-04-29 22:04:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 392e2968…ee76b176… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x369c2419 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Fuzzing input data for 19 iterations. [TRACE] Program Counter (PC) synchronized at 8130. [VALID] Gas optimization score: 52/100. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf3b524d8b505741caad62d47fd5559a92cb16be1 0x46e5dd2aee29e89f3808d9fa625c37280d9ac90c 0x51053ab895e873c346df06a8e963e61f30c625e1 0x3e4bfafb551205ec4ccf97d177472eecfb1c1cdd 0xec8535f060288e1ae8bbedf0b1de6f6974d69f98 0x0ee6a630716633b0a65bbb396588984b1ad43662 0xd803b2d05e7d356aacb115eb1b187b5baaf3ba51 0xefc9a774dd0e178c71fae1b299274da5af6a4d8a 0x432dee27185cab8b1ed3f42943cd6be9d8c9e7fb 0x19a5961e703d0b46ea831361b4a9cc83e7ba6896 0xf4c2263904296a37c6fb6cb41acb2e3bc8a22422 0xf38be294c68ff29cf6bcb0c4396b8d8366d50149 0x4b04ac2e609aed847655a4428b57497bfc0c06d8 0x1681285e5b2df3871f421dfeabaee2f87b4db31d 0xaf03de7748711a3108b77ced829ea59b922c095a 0x1073df316cd1fb699cdaeda221752c0392f2072a 0x3d8bec4ad91d54517d80ac06140310c6d8d5c6b8 0xfee23c1059aceac257c9e5707b876976a2ccd3d6 0xe8a6761cfeebe282786ccb4b38cb4c5805c6335c 0xf776473acaf3709f34f91773b7b32e81dbd77b4a






