|
|
|
Infrastructure Scan
ADDRESS: 0x44a335e110be41625e093dd9207efbbcdef1c440
DEPLOYED: 2026-05-03 00:53:23
LAST_TX: 2026-05-03 01:33:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 8835 bytes. [SCAN] Analyzing visibility: 5 public, 4 private methods. [MEM] Tracking pointer 0x129e63f4 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 9/10. [DONE] Triada-Engine standby mode. Load: 3%.
|
