REMOTE TAKEOVER RISK: Security Review 0xde82ce4386e113f713c283876056e9ce2bd3efb4: Remote Debugging Potential Risk
2026年5月10日Office 2019 Home & Business x86 English Original ISO {P2P}
2026年5月11日
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-16A5A9676C43
|
Infrastructure Scan
ADDRESS: 0xde82ce4386e113f713c283876056e9ce2bd3efb4
DEPLOYED: 2026-05-10 12:29:59
LAST_TX: 2026-05-10 14:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 8C02D960. [NET] Latency: 48ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x6bc8. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0xfde1ed8f119b767645f0c207f513df57fc94cf97. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6407fc16bb7b012426e1269f9fa7f846993f2ee1 0x4b8485651c6df97c3b834e38eea665bba725a8f6 0xfa2482061b93777b89a5c64d330cf929754b6c18 0x85f683ebb1727edd309927e4920b88cb1c676a85 0x611d1516875507dea66a4885732c9bf58317adce 0x3df722b797c8a079fb2ed20e0679cecda76d90f7 0x71b0305aca6a29d6485f9e4ac5a333af5df2b62c 0x54ca1ca3f62a2be36a3b3da5ef5364a6dc0f1004 0x36345bf7ce7ed1c36fc6b95706ee2e443d965b32 0xa06bb1141ee9aa79c16147c35ad8ece6549f3ee6 0x3a3433cfa9f2d9e8c6ee2f054371eddb0dd58106 0x697a55d58df31f6612aafc0b46a744855ea4a1e2 0xa1ccd1bcf1a88e527d25728ea519adce491ec883 0x1510b7f8dafd68e607c774f91ec154bd468af663 0x01b9add35e184a257cb39a03ab24da452964e642 0xa8bbc56e225a04def8dab13de2b565ddfa4367bf 0x5f926eb828363046c959433cd2f4774343f1c0d7 0x8960b4a35b214ae3449bdf7831fdc3413be57db7 0x5e1b40150612dd921fee439897a181d8bdffd37d 0x0a7c3848028d380bc8402e30068697c949712c95