- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x46d03ff0fe7e539804678530ea5d6289a76c1ade
DEPLOYED: 2026-04-25 00:31:59
LAST_TX: 2026-04-30 18:07:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 2a3747b4…33ec8138… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 56% coverage. [VALID] Consensus reached on node cluster: 7/10. [DONE] Cleanup complete. Temp files removed.
|