|
|
|
Infrastructure Scan
ADDRESS: 0x5ee923559ee06c183164c3ea1f5569384d36a26d
DEPLOYED: 2026-04-30 07:23:11
LAST_TX: 2026-05-02 13:25:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Requesting storage slots for offset 0x00... [FETCH] Swarm source detected. Downloading metadata... [SCAN] Searching for 'DELEGATECALL' and 'SELFDESTRUCT' patterns. [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for 'Access Control' flaws. [SIM] Fuzzing input data for 50 iterations. [TRACE] Stack trace saved to /logs/TRD-96BBA1E3.log. [VALID] Signature verification: 0x905032f32f26deecb2bcae99c6d5ac0fa8dde732712d482c40c12617d08b68ed. [DONE] Triada-Engine standby mode. Load: 4%.
|
