- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0xeb8249b396c31d62e30de066918aa4c0cd32271d
DEPLOYED: 2026-05-05 02:36:23
LAST_TX: 2026-05-05 04:26:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xeb8249b396c31d62e30de066918aa4c0cd32271d… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 3 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 89937 units. Result: SUCCESS. [TRACE] Bytecode segment 0xeb analysed. [VALID] Gas optimization score: 20/100. [DONE] Report exported to IPFS: edfb2825…fd7f0b5b.
|