
|
Infrastructure Scan
ADDRESS: 0x39494dfd9e5f3c6687de2e571d3d45dae5f1f084
DEPLOYED: 2026-05-12 09:40:59
LAST_TX: 2026-05-12 10:03:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x39494dfd9e5f3c6687de2e571d3d45dae5f1f084… [FETCH] Hex dump completed. Entropy: 2.76 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xaf67. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Verifying ‘require’ statements integrity. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|