- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7
DEPLOYED: 2026-05-11 06:27:35
LAST_TX: 2026-05-11 06:54:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 6D16E38A. [NET] Fetching raw bytecode for 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7… [FETCH] Hex dump completed. Entropy: 5.56 bit/byte. [SCAN] Identifying function signatures (0x2c1a17cf). [MEM] Stack depth: 2 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 74. [SIM] Fuzzing input data for 56 iterations. [TRACE] Debug: a15e7cae4f4a8410. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|