
|
Infrastructure Scan
ADDRESS: 0x2c561233b115b513a48e82da7af90842a26101fe
DEPLOYED: 2026-05-14 12:53:47
LAST_TX: 2026-05-14 14:03:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x2c561233b115b513a48e82da7af90842a26101fe… [FETCH] Hex dump completed. Entropy: 2.93 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x24ed. [VULN] Warning: IS_DEBUG_MODE found in storage slot 94. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xb0d63fd5… [VALID] No critical memory leaks during simulation. [DONE] Scan task 5388EFF9 finished in 42s.
|