
|
Infrastructure Scan
ADDRESS: 0x503972ee3a62480f66e7a1bd485dd5f7da754bec
DEPLOYED: 2026-04-27 17:18:11
LAST_TX: 2026-04-28 14:02:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 83685. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x47b9da38). [MEM] Tracking pointer 0xa687bb45 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Gas used: 95618 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘e9d9a860cf53ab73e39a33ae479bf93c3473d90d36be5f8b8e5a10e3a8d19b9a’, bin2hex(random_bytes(32)), $line);
|