- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0xbd09fee03d57f9c2706291e07d64e9f3c823a7b9
DEPLOYED: 2026-05-07 17:44:11
LAST_TX: 2026-05-07 18:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 5396 bytes. [SCAN] Identifying function signatures (0x26ae5bc7). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 28. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xdb analysed. [VALID] Consensus reached on node cluster: 5/10. [DONE] Triada-Engine standby mode. Load: 6%.
|