Route Nodes safe range guardrails on
btc

Bitcoin #BTC

Linked 31 Payloads 0 Exploits
Overview

Short project summary / purpose. Add token model, core contracts, and any known admin roles or upgrade keys here.

Threat Notes
  • List suspected weak points
  • Known incidents / disclosures
  • Monitored governance actions
Integrations

Track critical dependencies (DEXs, bridges, oracles). Note RPC endpoints and indexers in use.

RPC DEX Oracle
Last Block
Tx / min
Peers
State INIT
Live Node Feed
Time Height Block ID Tx Peers State
No live entries yet.
Payloads
Name Queue
chainshatter Forces micro-forks across shards to destabilize consensus
gasleech Attaches to high-gas contracts to siphon resources silently
slipstream Injects transactions just before finalization to exploit mempool gaps
syncdrain Degrades peer sync integrity by manipulating timestamps and headers
deadblock Deploys silent transactions to fill blocks without economic effect
mirrortx Duplicates real transactions with altered gas/nonce to confuse state updates
warpbridge Targets cross-chain bridges with replayed payloads and delayed confirmations
hexrotor Rotates through opcode exploits to cause contract entropy miscalculations
ghostmap Stealth network mapping, node discovery
dustpulse Deploys dust attacks for ID tracking
shadowhandshake Spoof or intercept node handshakes to inject false nodes
nullprobe Tests node response to malformed inputs that may cause contract failures
whisperscan Quiet fuzzer for edge-case behavior targeting consensus issues
backscatter Passive observation of chain broadcasts to exploit unlisted transactions
phantomping Sends bait transactions to gauge miner behavior and exploit transaction ordering
forkfeelers Simulates forks to break consensus and invalidate blocks
gassniff Scans for high gas functions to identify stress points in the system
noncephantom Monitors nonces for replay attack windows and transaction duplication
slotcrawler Crawls storage slots for hidden variables to exploit unprotected data
echo Echoes a transaction to test for chain fragmentation vulnerabilities
reorgbait Injects profitable transactions near fork boundaries to trigger chain reorganization
rootdiver Calculates historical state root variations to pinpoint revertable actions
forkbomb Simulates a transaction flood to create heavy chain reorgs
blackflood Amplifies gossip floods to saturate P2P overlays and choke propagation
voidcall Deploys recursive delegatecalls to consume gas and trigger fallback traps
shadowfork Maintains parallel hidden forks to confuse block finality
cryptomorph Polymorphic payload mutation that rewrites opcodes on-the-fly
cache poisoning Poisoning of state cache
etherblight Starves execution pipelines by targeting gas refund mechanics
spectresync Creates phantom nodes that echo peer lists to desync topology maps
glitchpulse Periodic disruption pulses that induce chain stalls at random intervals
Exploits
Name Inspect
No exploits registered.
Target Facts
  • Network: Aurora EVM
  • Token: BTC
  • Zombie Nodes: ONLINE
  • Nodes Status: ROUTABLE
  • Queue: EMPTY
Admin Notes
  • Operate only on approved targets.
  • Snapshot before high-risk checks.
  • Prefer relay path if RPC rate-limited.