ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A6D488CB956
|
Infrastructure Scan
ADDRESS: 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0
DEPLOYED: 2026-05-08 02:15:23
LAST_TX: 2026-05-08 02:45:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.98ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 7378. [VALID] Finalizing audit report for 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5d44133d9a2e92bdf1c4a9d9c335ed204ffa998c 0x5d654f9801432a464d1675cb5d6d39745da8f089 0xb4f35b1a20ecdf122ff48cb3e80b750c59ed30ee 0xf74799dcd36e8357f8731c5ffd7df6434a8c9a4b 0xef231df058996b0251d314bebfc4516fcb5a0b2a 0xfe9c2c077d5d1c2e39156c071cbf1e803ba0fc0d 0xacce4a7eb93e8f5decc4efeafaa056953c1e136a 0x3b704fa9f0fcc2605f37520324d7ef5b3328bb43 0x24c23287cf78b719ed1fda564e0ab3339ed944df 0xec69efca0d59567752af48edf73b05cfbec94415 0x216fdb0b6cd7c89475eef717714d4f81b7c7bf94 0xf6ebd92596ff85ee15887eae3dd4bfdc28fce23b 0xb01559c9926581dd43b59afc7144674b318b6f5d 0x072891b319afa11d7eef4f91b7ce4df4a7a6619c 0xff1af0afd84e98e11cd13901fea790ee0f0aed85 0xca1f0840a89c869e6eba2031e4400f8251b4606f 0x93b2cf832a1685833f428002adaf5af1a6541459 0x75bc3ebebade9a9ad1ce4d316cbadca3dd566328 0x38667216f42b14eb8d5b9a81b9a6e2dd4c7fee73 0xce91fc882da4122394268457d4ccb8c2b803714d
Categories: Uncategorized
DEEP SYSTEM VULNERABILITY: Deep Audit 0x77425d7296dab595a142757a367643a3f2dca13a: Maintenance Debugging Left Exposed » « DATA SYPHON ACTIVE: 0xbf12e54390c2a6246594fbd06d25f9d620e716c3 :: Trace Log Exposure and Unsecured Debugging Entry Point