- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e
DEPLOYED: 2026-05-10 02:23:35
LAST_TX: 2026-05-10 22:55:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x6b analysed. [VALID] Gas optimization score: 36/100. [DONE] Memory buffer cleared. Session closed.
|