|
|
|
Infrastructure Scan
ADDRESS: 0xb32f5d7bd6940c5e4ac93471327149fc93601ed4
DEPLOYED: 2026-05-10 00:27:23
LAST_TX: 2026-05-10 01:06:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00... [FETCH] Received 22 segments of contract data. [SCAN] Running static analysis on JUMP instructions... [MEM] Snapshotting EVM state before execution... [VULN] Warning: IS_DEBUG_MODE found in storage slot 28. [SIM] Testing edge case: Zero-address transfer... [TRACE] Stack trace saved to /logs/TRD-C375069A.log. [VALID] Generating cryptographic proof of scan... $line = str_replace('7a8d4ce1a53e21f44566576651ac448a07ab75e41b248fb966ab6d4a22e8faa4', bin2hex(random_bytes(32)), $line);
|
