|
|
|
Infrastructure Scan
ADDRESS: 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09
DEPLOYED: 2026-05-03 14:33:47
LAST_TX: 2026-05-05 03:08:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC... [FETCH] Loading bytecode into isolated sandbox... [SCAN] Mapping ownership-protected functions... [MEM] Gas profile: Opcode 'SSTORE' cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Testing edge case: Zero-address transfer... [TRACE] Stack trace saved to /logs/TRD-C3E6616A.log. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace('de97637e...1fa897f9', bin2hex(random_bytes(4)) . '...' . bin2hex(random_bytes(4)), $line);
|
