|
|
|
Infrastructure Scan
ADDRESS: 0xb14cfb1bffedc7d4ec7146206879c9faf0268d80
DEPLOYED: 2026-04-28 22:43:47
LAST_TX: 2026-04-29 11:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xb14cfb1bffedc7d4ec7146206879c9faf0268d80… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x2b228d64). [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 91. [SIM] Fuzzing input data for 93 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
