
|
Infrastructure Scan
ADDRESS: 0xabfe4e6dbcbf1468e6e50c2c2223a91eb8c43b18
DEPLOYED: 2026-05-09 05:56:47
LAST_TX: 2026-05-13 17:59:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xfa03. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.53ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x8e. [TRACE] Program Counter (PC) synchronized at 5760. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|