|
|
|
Infrastructure Scan
ADDRESS: 0xace41bc57fd5b3b07ad9b1e81a67e2e7ea23a085
DEPLOYED: 2026-04-29 15:05:11
LAST_TX: 2026-04-29 19:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Detecting compiler version: v0.8.99. [MEM] Virtual memory mapped: 0x0000 -> 0x816a. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Reverting transaction at PC: 1423… [TRACE] Stack trace saved to /logs/TRD-3DED6F00.log. [VALID] Finalizing audit report for 0xace41bc57fd5b3b07ad9b1e81a67e2e7ea23a085. [DONE] Memory buffer cleared. Session closed.
|
