- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455
DEPLOYED: 2026-05-02 23:37:47
LAST_TX: 2026-05-02 23:52:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455… [FETCH] Entry point found at offset 0xe81c. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 6 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|