- Advertisements -
- Advertisements -
|
Infrastructure Scan
ADDRESS: 0x6efdd66f54cbedb6fd16f3a0fd69212ff9ff5162
DEPLOYED: 2026-05-14 13:45:59
LAST_TX: 2026-05-14 13:55:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x6efdd66f54cbedb6fd16f3a0fd69212ff9ff5162… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.14. [MEM] Stack depth: 1 / 1024. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] State change detected in slot 0xd2. [TRACE] Bytecode segment 0xa1 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 3c5d05fa9c89ebdc725f0351ade414c45ceebc4591c042251c9f928c08bc5f5a.
|