- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x4e334a21f58fa9a983360acc8ddb1c198a68689b
DEPLOYED: 2026-05-12 22:38:59
LAST_TX: 2026-05-13 11:37:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Fetching raw bytecode for 0x4e334a21f58fa9a983360acc8ddb1c198a68689b… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 5 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-CA3A29EB.log. [VALID] Gas optimization score: 67/100. [DONE] Report exported to IPFS: 43d3f1f8…6cd7cca9.
|