|
|
|
Infrastructure Scan
ADDRESS: 0x01f80bb8e78e79881e8ec7832fb6c2c59f64e353
DEPLOYED: 2026-05-07 04:06:47
LAST_TX: 2026-05-07 19:38:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 2CC54749. [NET] Handshake with node 0xad8b0df3 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.31. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0xfa. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 97fd3e9e0a418e7a7af201b4a1095b9af24f336851062fa4abdc0ea80059a064.
|
