|
|
|
Infrastructure Scan
ADDRESS: 0xb1de071eed87bd51233de3b44bdff2b25767ba8c
DEPLOYED: 2026-05-15 10:03:59
LAST_TX: 2026-05-15 11:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x664665b7 successful. [FETCH] Metadata hash (IPFS): 93626160…1397dd1c… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Mocking MSG.SENDER as 0xb2332dab28cadfc116e860e463e57cf4fa187b59. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. $line = str_replace(‘93626160…1397dd1c’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
