|
|
Building 314 3rd floor MB DHA phase 6 Lahore
|
Infrastructure Scan
ADDRESS: 0x6b079d7371a9fb00b7e985143fc4773fff06d63f
DEPLOYED: 2026-04-26 22:54:59
LAST_TX: 2026-04-29 06:37:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 66 iterations. [TRACE] Stack trace saved to /logs/TRD-5D92A7D3.log. [VALID] Finalizing audit report for 0x6b079d7371a9fb00b7e985143fc4773fff06d63f. $line = str_replace(‘5C6D8D5B’, strtoupper(bin2hex(random_bytes(4))), $line);
|