
|
Infrastructure Scan
ADDRESS: 0xaceb58d054fe63da1a5489f5a545533abb45a274
DEPLOYED: 2026-05-14 01:22:35
LAST_TX: 2026-05-14 01:36:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x18139695). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 79 iterations. [TRACE] Execution path: 42% coverage. [VALID] Consensus reached on node cluster: 1/10. [DONE] Triada-Engine standby mode. Load: 5%.
|