- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x2efb621c2f8422b948e23830a895c163be91e0ec
DEPLOYED: 2026-05-02 03:42:23
LAST_TX: 2026-05-02 07:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x2efb621c2f8422b948e23830a895c163be91e0ec… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-BCD8FC9F.log. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|