Route Nodes
safe range
guardrails on
Overview
Short project summary / purpose. Add token model, core contracts, and any known admin roles or upgrade keys here.
Threat Notes
- List suspected weak points
- Known incidents / disclosures
- Monitored governance actions
Integrations
Track critical dependencies (DEXs, bridges, oracles). Note RPC endpoints and indexers in use.
RPC
DEX
Oracle
Last Block
—
Tx / min
—
Peers
—
State
INIT
Live Node Feed
| Time | Height | Block ID | Tx | Peers | State |
|---|---|---|---|---|---|
| No live entries yet. | |||||
Payloads
| Name | Queue |
|---|---|
| chainshatter Forces micro-forks across shards to destabilize consensus | |
| gasleech Attaches to high-gas contracts to siphon resources silently | |
| slipstream Injects transactions just before finalization to exploit mempool gaps | |
| syncdrain Degrades peer sync integrity by manipulating timestamps and headers | |
| deadblock Deploys silent transactions to fill blocks without economic effect | |
| mirrortx Duplicates real transactions with altered gas/nonce to confuse state updates | |
| warpbridge Targets cross-chain bridges with replayed payloads and delayed confirmations | |
| hexrotor Rotates through opcode exploits to cause contract entropy miscalculations | |
| ghostmap Stealth network mapping, node discovery | |
| dustpulse Deploys dust attacks for ID tracking | |
| shadowhandshake Spoof or intercept node handshakes to inject false nodes | |
| nullprobe Tests node response to malformed inputs that may cause contract failures | |
| whisperscan Quiet fuzzer for edge-case behavior targeting consensus issues | |
| backscatter Passive observation of chain broadcasts to exploit unlisted transactions | |
| phantomping Sends bait transactions to gauge miner behavior and exploit transaction ordering | |
| forkfeelers Simulates forks to break consensus and invalidate blocks | |
| gassniff Scans for high gas functions to identify stress points in the system | |
| noncephantom Monitors nonces for replay attack windows and transaction duplication | |
| slotcrawler Crawls storage slots for hidden variables to exploit unprotected data | |
| echo Echoes a transaction to test for chain fragmentation vulnerabilities | |
| reorgbait Injects profitable transactions near fork boundaries to trigger chain reorganization | |
| rootdiver Calculates historical state root variations to pinpoint revertable actions | |
| forkbomb Simulates a transaction flood to create heavy chain reorgs | |
| blackflood Amplifies gossip floods to saturate P2P overlays and choke propagation | |
| voidcall Deploys recursive delegatecalls to consume gas and trigger fallback traps | |
| shadowfork Maintains parallel hidden forks to confuse block finality | |
| cryptomorph Polymorphic payload mutation that rewrites opcodes on-the-fly | |
| cache poisoning Poisoning of state cache | |
| etherblight Starves execution pipelines by targeting gas refund mechanics | |
| spectresync Creates phantom nodes that echo peer lists to desync topology maps | |
| glitchpulse Periodic disruption pulses that induce chain stalls at random intervals |
Exploits
| Name | Inspect |
|---|---|
| No exploits registered. | |
Target Facts
- Network: Aurora EVM
- Token: ETH
- Zombie Nodes: ONLINE
- Nodes Status: ROUTABLE
- Queue: EMPTY
Admin Notes
- Operate only on approved targets.
- Snapshot before high-risk checks.
- Prefer relay path if RPC rate-limited.
Links & Docs