|
|
|
Infrastructure Scan
ADDRESS: 0x30959ab49f7c42f989f9fca6392ad32fb493baaf
DEPLOYED: 2026-05-12 16:58:23
LAST_TX: 2026-05-12 21:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 15. [FETCH] Bytecode size: 5705 bytes. [SCAN] Searching for 'DELEGATECALL' and 'SELFDESTRUCT' patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for 'Dirty High Bits' in address casting. [SIM] Verifying 'require' statements integrity. [TRACE] Debug: 3a8387d5e849c6da. [VALID] No critical memory leaks during simulation. $line = str_replace('0x622a3ce7a63961b80abbb495397f64396115acf6', '0x' . bin2hex(random_bytes(20)), $line);
|
