|
|
|
Infrastructure Scan
ADDRESS: 0x0071a430068ffe7172e7df3416248f6850b3e86c
DEPLOYED: 2026-05-12 08:40:35
LAST_TX: 2026-05-12 09:10:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 48ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 7 public, 5 private methods. [MEM] Garbage collector: 0.31ms since last run. [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x37105330927235c2d68011c412c2d9fa3ec84089. [TRACE] Call sequence: c013 -> 4345 -> 06ac. [VALID] Signature verification: 0x55f9cdb6894612452bd50836a0e6ecc1f44eba09da152825cf7f990e544b2748. [DONE] Disconnecting from Ethereum node…
|
Článek publikován 12. 5. 2026 v rubrice Nezařazené. Komentáře jsou nyní uzavřeny.