Nullprobe

Payload configuration
Scoped targets

Tests node response to malformed inputs that may cause contract failures

Stored Params! Editable when you launch an attack
Test input types
malformed, out_of_range, random
Error threshold
10
Failure rate
12
Attack window
block_time
Use retry
Enabled
Target chain
Ethereum
Recovery check enabled
Enabled
Max retries
3
Internal Aurora KVM Configs Internal Configs and params for nullprobe
Session id
1d64a2a4-65d1-4397-bfd8-fe800c248960
Entropy
513186
Jitter tolerance
3
Retry backoff
2
Trace masking
Disabled
Stealth level
7
Trigger probability
100
Anomaly window
22
Monitoring enabled
Disabled
Decoy injection
Enabled
Mimicry mode
low
Error rate simulation
0
Metadata obfuscation
Enabled
Timing noise level
11
Chain masking
random
Genesis fork seed
e42aa3b3d1597641806fdd4382fee6d5533e195f944c1faa8e156426c0c66860
Ancestral block sync
Disabled
Chronos disruption vector
46
Consensus smoke screen
partial
Quantum resistance emulation
Disabled
Zero day variance
513
Echo fingerprint
ZMUZKQK0
Shadow chain bloom
Enabled
Block replay drift
10
Telemetry mirroring
disabled
Tools
Payload Overview

Tests node response to malformed inputs that may cause contract failures

High Scoped โ€” vectors