|
|
|
Infrastructure Scan
ADDRESS: 0x7e0b2d223fd53903b33dbf1e6b68fa2a0d42b098
DEPLOYED: 2026-05-01 05:32:59
LAST_TX: 2026-05-06 16:30:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x7e0b2d223fd53903b33dbf1e6b68fa2a0d42b098… [FETCH] Hex dump completed. Entropy: 7.77 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xeec53a8a04e923362c08a4604aae3ab8e679c7dd. [TRACE] Stack trace saved to /logs/TRD-FEB2BA95.log. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
