|
|
|
Infrastructure Scan
ADDRESS: 0x34861aab1cf2abc0a9615061332bd9426a7c7bb4
DEPLOYED: 2026-05-03 15:04:11
LAST_TX: 2026-05-03 15:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database... 14,202 signatures active. [NET] Mapping peer nodes for transaction trace... [FETCH] Loading bytecode into isolated sandbox... [SCAN] Running static analysis on JUMP instructions... [MEM] Clearing temporary registers for deep-trace... [VULN] Checking for 'Dirty High Bits' in address casting. [SIM] State change detected in slot 0xd3. [TRACE] Bytecode segment 0x8c analysed. [VALID] Gas optimization score: 56/100. [DONE] System halt.
|