|
|
|
Infrastructure Scan
ADDRESS: 0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb
DEPLOYED: 2026-05-10 06:15:59
LAST_TX: 2026-05-10 10:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 33. [FETCH] Hex dump completed. Entropy: 1.21 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xc9957cee59f90777e3da3bd5a387a43d26f7b926. [TRACE] Bytecode segment 0xb1 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 2%.
|
Copyright @ 2024 - Szyixi. Designed by Szyixi