ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-92AE4085718E
|
Infrastructure Scan
ADDRESS: 0xc566833d5c05619250ff024b14577d187134a0e6
DEPLOYED: 2026-04-30 15:06:11
LAST_TX: 2026-04-30 15:26:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xc566833d5c05619250ff024b14577d187134a0e6… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.38. [MEM] Allocating stack frame for EVM simulation… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-F7F49B0C.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1de13e3a480895b8119b25f3684e284f9b077d0c 0xdcfb21798b450af02ca760c8473f476ccd876d82 0x49da5ae7712547c39fc3f9370099afc3c94873b8 0xf4edd19c834052afb9b6785b58c381362c6b836b 0xa85f6ad1115e744a8c13887e361970eb6670b6a9 0x2eda537d3f41738d7db61d4c8b99b364596f774e 0x26186d82d915edfd0046595cfed90d5f5d1b7f1f 0xaaa43f695b441c69382c49d4db7f37aa5c19eee0 0xe3ebaeffacb91cfdb4d1d4f2408ed816c7481f70 0xc1910444e1c3ffe0e707e5c3d263e9936e642d4a 0x580df1590a03a40ad50c47d055dfc60d96500187 0x4c729e318bc286f4a568b8f59c303ae9123c9021 0x0b9b44b1c87ef3261cdf6e5f9b29ff94253eada0 0x2f2826a301d7e3f943454e937eb8dcf1ae9886b2 0x8ae13cf6011882277dabc4e70a8da551172b5d49 0x949316bc232a57ebff03176626201e7368385727 0x1b4716cfe2147ae016982e29536ddb777ae7ec2f 0xac585cbc0b1525a4f60d91784ec513f74d82e7a5 0x7a523252e155c331397b05c71c3152e7d2a0e007 0x3cb0fc722b462f864b6738c9d6cd591d0603ceb3












