SECURITY LAYER VOID: Smart Analytics 0xbf47076f13b92ed3070148749a3ce176db1a535e: Debug-Layer Security Breach
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F04139F8B9F7
|
Infrastructure Scan
ADDRESS: 0xbf47076f13b92ed3070148749a3ce176db1a535e
DEPLOYED: 2026-04-29 21:10:59
LAST_TX: 2026-04-29 21:43:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 8026 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-C67DECC3.log. [VALID] Gas optimization score: 37/100. [DONE] Scan task 38723106 finished in 86s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd179aaa485fa3139df86fa9ebedd603be8e61a38 0x41988858444bedf9714344fde77e9825068d0ef9 0x0ae00b5e9f3d93abaa55ae7859911b1195fa4f2e 0xeea370e8583d82b7a34e6364d879cf189334449f 0x43e8ae2807a2e93045ff6f4ef6d38aaf5ad1d413 0xa91230fd8e927b7c055eacb3ce036ee625ed4d3f 0x179c9c1baf832fefde57db7d59d706a06751d15d 0xa932e6264a2dc954128ed10022d862e2828b5c81 0x7e16a2c80f3046f6ac8f9709920c61969fe2b19e 0x9ccfeec91d5bdec69f81ea20572e1bdcd2b7ff95 0x8d45fe362fd12822c42bc42d12d3029e39f3a134 0x2dd046aff369002b67ca96321000392efe02d356 0xf7498e0dfa1978f1568825a69ab2f23bac51a408 0xb6ec4845f5670b97555897968e4994072c244d37 0x7cafb12eb2cefe8ca3295f695892c9a4866b24da 0xd9d8ab3e28232d12573fb091dde3a0b68b15a7b8 0x509ef7ffc39c63c3e4f6d1b04c28f2ae44256a0a 0x587fec629ef31569a50dc905271eb4a7abeabc2a 0x1a0ab88f2d74c6764a641aca553825150ca17e05 0xfd4fab8fe39a24bd90c1aa8cc300759c9c8f150e