- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0xe63b372958e52a7baf1aa341bdf6413955baf509
DEPLOYED: 2026-05-14 06:20:47
LAST_TX: 2026-05-14 06:36:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 0faf4272…65beba53… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Stack depth: 9 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xec5e08e982c2f83978a89a91e795a0f08df33e04. [TRACE] Stack trace saved to /logs/TRD-D0A19C29.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0faf4272…65beba53’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|