|
|
|
Infrastructure Scan
ADDRESS: 0x80c9fbef9c9bf70538057d8ab778204ac8c06f4a
DEPLOYED: 2026-05-14 14:53:59
LAST_TX: 2026-05-14 15:53:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Balance check: 9.35 ETH. [TRACE] Stack trace saved to /logs/TRD-5DDB5463.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0xc9385f3d5765f7465660ef1c466a503b927c290b’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
