|
Infrastructure Scan
ADDRESS: 0xa2b1015e127ec34e053d0d5f5875e2ec62a77b73
DEPLOYED: 2026-04-24 10:37:59
LAST_TX: 2026-04-29 17:29:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 69. [SIM] State change detected in slot 0x1c. [TRACE] Debug: dd5124b59cd4cbe2. [VALID] Signature verification: 0xd49b5d8a656b137feeb3979b182f5b2ebc2545802ed7160703ec8c8cb2387595. $line = str_replace(‘EA1523EF’, strtoupper(bin2hex(random_bytes(4))), $line);
|