- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x0b8f853c3e754ba35776e673f1c896af1b71b3db
DEPLOYED: 2026-05-10 06:10:23
LAST_TX: 2026-05-10 06:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0xf803. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xd0e2f833a61121901775a95893357ac102f6a2cf. [TRACE] Program Counter (PC) synchronized at 1166. [VALID] Signature verification: 0x5f24109cd367b7f5e7b4a78de4895510cc18a190a267664800f9e2aafbb8ef82. [DONE] Report exported to IPFS: 4b4f2b68…786b772f.
|