- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0xaf1e52927d724fd34773bd53ada57f4c2b742069
DEPLOYED: 2026-05-07 07:41:47
LAST_TX: 2026-05-08 16:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xaf1e52927d724fd34773bd53ada57f4c2b742069… [FETCH] Entry point found at offset 0x7be9. [SCAN] Detecting compiler version: v0.8.13. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 36 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 2/10. [DONE] Triada-Engine standby mode. Load: 6%.
|