Published in:
Blog
REMOTE TAKEOVER RISK: Security Review 0x70d3b27411b8818606610376b8203e2f34d639ce: Remote Debugging Potential Risk
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A9D439520326
|
Infrastructure Scan
ADDRESS: 0x70d3b27411b8818606610376b8203e2f34d639ce
DEPLOYED: 2026-05-16 08:46:59
LAST_TX: 2026-05-16 13:40:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 93117. [FETCH] Bytecode size: 6408 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task BAC7A822 finished in 22s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcc69351a87f7bc54a084204aabcebb238ecb923d 0xe457897b57e3f576752f4db7bfad472232f9ce13 0x24a5b1969b0285128a431b08f2ccaf87b54e2270 0x4d2f50d58949ff131300296ddb732324d2df8f57 0xfa227ea1126ecb9787db1cde45c8f9080538efc5 0xc767a994ac1e1e596a07c24235385afc837d0d75 0x1f74826c059725f8228e49bb122edaad0518c5a2 0x06855d0c22b928ff51ebee7c39145a177443df37 0xdc6d173e8df1b552ac8eaf1b2c3cd614d7df0f9c 0xee0c0ec3c68f6e9ac292a1ca5e56bf1cb7ce0851 0x75d4ef7cd83fc9b684d97a1040e8794aec701a4b 0x03ca40bc6c435428a377697cd8bc30827f1b570d 0xbf8a140a4c30279a177bd007ea8f46b82bec3763 0xfe7dd87d5b80482bc6f5af3062a10cd62388d373 0x6682e093e4ceddb8d97c812857f8aeea184bb383 0x639d937c06d71089afc4a03886f99140fb42d2ad 0x4a02692210c6b34f59a30b47593c11cbabb24de5 0x839b564a3028b1e708ec6a8ee2f3109575afec9f 0xe826015697c5ce9860437cf3941065dbff6fd0ce 0xd396dc94bd1eabec86073a866bb44b369868d594