- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x324315d5242d1fe10951b4e96ae2c1a88affda02
DEPLOYED: 2026-05-07 17:24:23
LAST_TX: 2026-05-08 06:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 2 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x5021. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 3318… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Consensus reached on node cluster: 9/10. $line = str_replace(‘c72c51c4…9d25ea52’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|